{"title":"基于 T-S 模糊模型的无人海洋航行器的动态事件触发安全控制","authors":"Shanling Dong;Zhiyi Lai;Bo Wang;Zheng-Guang Wu;Meiqin Liu;Guanrong Chen","doi":"10.1109/LCSYS.2025.3554846","DOIUrl":null,"url":null,"abstract":"This letter investigates the event-triggering security control problem of unmanned marine vehicles (UMVs) in the presence of actuator failures, cyber attacks and wave-included disturbances. The Takagi-Sugeno fuzzy model is employed to represent the nonlinear UMV system through the utilization of IF-THEN rules and membership functions. The dynamic event-triggering control law is devised due to the limited resources in the networked control environment, while avoiding the Zeno phenomenon. A sufficient condition is proposed to ensure the system stability and the solution to the controller gain is given as well. After theoretical analysis, simulation experiments are conducted to validate the efficacy of the proposed method.","PeriodicalId":37235,"journal":{"name":"IEEE Control Systems Letters","volume":"9 ","pages":"62-67"},"PeriodicalIF":2.4000,"publicationDate":"2025-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Dynamic Event-Triggering Security Control of T-S Fuzzy Model-Based Unmanned Marine Vehicles\",\"authors\":\"Shanling Dong;Zhiyi Lai;Bo Wang;Zheng-Guang Wu;Meiqin Liu;Guanrong Chen\",\"doi\":\"10.1109/LCSYS.2025.3554846\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This letter investigates the event-triggering security control problem of unmanned marine vehicles (UMVs) in the presence of actuator failures, cyber attacks and wave-included disturbances. The Takagi-Sugeno fuzzy model is employed to represent the nonlinear UMV system through the utilization of IF-THEN rules and membership functions. The dynamic event-triggering control law is devised due to the limited resources in the networked control environment, while avoiding the Zeno phenomenon. A sufficient condition is proposed to ensure the system stability and the solution to the controller gain is given as well. After theoretical analysis, simulation experiments are conducted to validate the efficacy of the proposed method.\",\"PeriodicalId\":37235,\"journal\":{\"name\":\"IEEE Control Systems Letters\",\"volume\":\"9 \",\"pages\":\"62-67\"},\"PeriodicalIF\":2.4000,\"publicationDate\":\"2025-03-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Control Systems Letters\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10938998/\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Control Systems Letters","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/10938998/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
Dynamic Event-Triggering Security Control of T-S Fuzzy Model-Based Unmanned Marine Vehicles
This letter investigates the event-triggering security control problem of unmanned marine vehicles (UMVs) in the presence of actuator failures, cyber attacks and wave-included disturbances. The Takagi-Sugeno fuzzy model is employed to represent the nonlinear UMV system through the utilization of IF-THEN rules and membership functions. The dynamic event-triggering control law is devised due to the limited resources in the networked control environment, while avoiding the Zeno phenomenon. A sufficient condition is proposed to ensure the system stability and the solution to the controller gain is given as well. After theoretical analysis, simulation experiments are conducted to validate the efficacy of the proposed method.