Next Article in Journal
Freud’s Model of the Mind Within a Predictive Processing Neuroscientific Paradigm
Previous Article in Journal
Emergence of the 2nd Law in an Exactly Solvable Model of a Quantum Wire
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Asynchronous Non-Fragile H Control for Time-Delay Markovian Jump Singularly Perturbed Systems with Variable Quantization Density and DoS Attack

1
School of Artificial Intelligence and Manufacturing, Hechi University, Hechi 546300, China
2
School of Electronic Engineering and Automation, Guilin University of Electronic Technology, Guilin 541004, China
3
Department of Mathematics and Computer Science, Changsha University, Changsha 410022, China
*
Author to whom correspondence should be addressed.
Entropy 2026, 28(3), 317; https://doi.org/10.3390/e28030317
Submission received: 4 February 2026 / Revised: 2 March 2026 / Accepted: 10 March 2026 / Published: 12 March 2026
(This article belongs to the Section Complexity)

Abstract

This paper investigates the asynchronous non-fragile H control problem for a class of Markovian jump singularly perturbed systems (MJSPSs) with time-varying delays. By applying a multi-layer structure method, a non-fragile controller with time delay is designed for the MJSPSs to adapt to disturbances caused by nonstationary quantization and DoS attacks. To model the asynchronous dynamics between the system and the controller mode, an independent Markov chain is employed to capture the asynchronous quantization and control behavior. By constructing mode-dependent Lyapunov–Krasovskii functions, sufficient conditions are derived to ensure stochastic finite-time exponential stability and H performance under conditions of delay, singular disturbances, and quantization uncertainty. The effectiveness of the method is validated using an inverted pendulum system controlled by a DC motor, demonstrating its ability to achieve robust stability and performance in bandwidth-constrained network environments.

1. Introduction

In the field of control theory, Markov jump singularly perturbed systems (MJSPSs) are an important area of research because they can model complex dynamics in applications such as industrial automation, power systems, and unmanned vehicle networks. Delay phenomena are prevalent in networked control systems, industrial processes, and robotics, often leading to performance degradation, instability, and other undesirable behaviors, necessitating robust stability analysis and control strategy design [1,2]. MJSPSs are characterized by Markov chain-controlled random mode transitions and singular system structures with algebraic constraints, and the introduction of random dynamics and structural complexity further exacerbates these challenges [3]. These systems are widely applied to capture real-world phenomena such as equipment mode switching, power grid reconfiguration, and communication link changes.
The complexity escalates when MJSs incorporate singular system structures, also known as descriptor systems, which extend beyond standard state-space models by encompassing algebraic constraints. MJSPSs with time delays thus represent a class of complex systems that require advanced control strategies to ensure stability, regularity, and shock-free behavior. Among these strategies, H control stands out as a robust method that excels at mitigating the worst effects of external disturbances and uncertainties on system performance [4]. However, traditional H controllers typically assume precise implementation, and this assumption is often violated in practice due to controller parameter variations. Although control laws are implemented digitally, inaccuracies inevitably arise from finite word length (rounding errors) in processors, tolerances of analog components in A/D and D/A interfaces, and component aging. These factors lead to deviations between the designed ideal gains and the actual implemented gains. Wang G. et al. studied the guaranteed cost control of semi-MJSs in a network environment using event-triggered controllers based on the mode classifications [5]. This vulnerability highlights the need for non-fragile control design, which maintains robustness even in the presence of such defects [6].
Due to the inherent limitations of digital communication, various challenges arise, including quantization effects [7,8,9], network latency [10,11], and signal loss [12,13], which may lead to degraded system performance or even instability. Among these, quantization effects are particularly critical, as they enable efficient bandwidth utilization by mapping continuous signals to discrete values. Sector boundary techniques are commonly used to address quantization errors, treating them as bounded uncertainties within sectors [14]. Quantization control optimizes resource utilization by discretizing signals before controller input, making it indispensable in bandwidth-constrained environments. However, traditional quantization approaches often assume mode-independent or synchronous mode-dependent quantizers, as explored in [9,15,16]. These assumptions may not fully capture the dynamic nature of MJSs, where system modes switch randomly according to a Markov process. Asynchronous quantization, where the quantizer operates independently of system modes, has received limited attention, with notable exceptions in [17,18,19]. Specifically, Ref. [17] investigated asynchronous quantizers for MJSs, demonstrating their potential to enhance control flexibility. To address the limitations imposed by finite bandwidth in the cyber–physical systems, the raw measurement output data is quantized before entering the network [20]. Ref. [21] investigated the problem of asynchronous resilient H dynamic state feedback control in a class of uncertain discrete-time switched nonlinear systems with input quantization. By using the time-delay asynchronous quantization control method, the stabilization problem of an uncertain discrete-time Markov jump power system subjected to deception attacks is studied [22]. Nevertheless, the integration of variable quantization density, which allows quantization levels to adapt dynamically to system requirements or communication conditions, remains underexplored in this context. Quantized measurement offers the promise of optimizing quantization precision, but its application to singular MJSs with time delays poses significant challenges due to the interplay of nonlinear dynamics, mode switching, and controller fragility.
Motivated by these challenges, this paper investigates asynchronous non-fragile H control for time-delay MJSPSs with variable quantization density. The main contributions are outlined as follows:
1.
A robust asynchronous non-fragile H control framework is proposed to address variable quantization density in bandwidth-constrained networks, ensuring stability and performance under time delays, singular perturbations, and mode-switching uncertainties.
2.
An asynchronous controller, governed by an independent Markov chain, is designed to achieve flexible mode-dependent control, while explicitly considering the impact of DoS attacks on system performance.
3.
Sufficient conditions for the existence of the controller are derived, integrating quantized measurement to enhance robustness and stability against quantization errors, time delays, and singularly perturbed dynamics.
The paper is structured as follows: Section 2 formulates the discrete-time MJSPSs and provides preliminary definitions. Section 3 conducts stability and H performance analysis. Section 4 validates the proposed approach through numerical experiments. Section 5 concludes the study with future research directions.
Notation 1.
R n denotes an n-dimensional vector. Pr is the probability function. E denotes the mathematical expectation. | · | is the norm. I denotes the identity matrix.

2. Problem Statement and Preliminaries

Consider the following time-delay MJSPSs consisting of N nodes:
x ( k + 1 ) = A σ ( k ) E ϵ x ( k ) + B σ ( k ) E ϵ ( x ( k ) τ ( k ) ) + C σ ( k ) u ( k ) + D σ ( k ) w ( k ) , y ( k ) = F σ ( k ) x ( k ) ,
where x ( k ) = [ x 1 T ( k ) , x 2 T ( k ) ] T R n x is state vector with n x = n s + n f ; x 1 ( k ) R n s and x 2 ( k ) R n f denote the slow and fast state vectors. u ( k ) R n u stand for the control input with the disturbance. y ( k ) R n y is the measured output. w ( k ) R n w is the external disturbance input. The external disturbance input w ( k ) R n w is assumed to be an arbitrary signal in w ( k ) l 2 [ 0 , ) , which can represent stochastic environmental noises with finite energy. A σ ( k ) , B σ ( k ) , C σ ( k ) , D σ ( k ) , and F σ ( k ) are known matrices. E ϵ = d i a g { I n s , ϵ I n f } and ϵ is the SPP. The time-varying delay term τ ( k ) satisfies the constraint condition 0 < τ m < τ ( k ) τ M , where the upper and lower bounds of the delay τ m and τ M are both positive integers. The system mode is regulated by a discrete Markov chain (DMC): σ ( k ) S 1 = { 1 , , s 1 } . The transition probability matrix (TPM) Π = [ π a b ] is given by
Pr { σ ( k + 1 ) = b | σ ( k ) = a } = π a b , a , b S 1 ,
where σ ( k ) 0 and b = 1 s 1 π a b = 1 .
In unreliable communication environments, the MJSPSs face problems such as data conflicts and communication congestion due to limited communication capacity. To address these challenges, this paper employs a quantized sensor communication protocol that determines which sensor can access the network at moment k through a scheduling mechanism. As illustrated in Figure 1, the measured output needs to be quantized before it is sent from the sensor to the controller via the shared communication network. The mode-dependent quantizer q ϖ ( k ) ( · ) is formulated as follows:
q s , ϖ ( k ) ( x s ( k ) ) = x s l , x s l 1 + σ s , ϖ ( k ) < x s < x s l 1 σ s , ϖ ( k ) , 0 , x s = 0 , q s ( x s ) , x s 0
where σ s , ϖ ( k ) = 1 ρ s , ϖ ( k ) 1 + ρ s , ϖ ( k ) with σ s , ϖ ( k ) ( 0 , 1 ) . According to the sector bound uncertainty [7], one has
q s , ϖ ( k ) ( x s ( k ) ) = ( I + Δ s , ϖ ( k ) ) x s ( k ) ,
where Δ s , ϖ ( k ) Λ s , ϖ ( k ) . The quantizer mode is regulated by a DMC: ϖ ( k ) S 2 = { 1 , , s 2 } . The TPM Φ = [ ϕ m n ] is given by
Pr { ϖ ( k + 1 ) = n | ϖ ( k ) = m } = ϕ m n , m , n S 2 ,
where ϕ ( k ) 0 and n = 1 s 2 ϕ m n = 1 .
Defining Δ ϖ ( k ) = d i a g { Δ 1 , ϖ ( k ) , Δ 2 , ϖ ( k ) , , Δ n x , ϖ ( k ) } and Λ ϖ ( k ) = d i a g { Λ 1 , ϖ ( k ) , Λ 2 , ϖ ( k ) , , Λ n x , ϖ ( k ) } , it is obviously that Δ satisfy ( Δ ϖ ( k ) Λ ϖ ( k ) 1 ) T ( Δ ϖ ( k ) Λ ϖ ( k ) 1 ) I .
Based on the quantizer (3), the non-fragile feedback controller is designed as follows:
u s ( k ) = α ( k ) ( K s , φ ( k ) + Δ K s , φ ( k ) ) E ϵ q s , ϖ ( k ) ( x ( k ) ) + ( K d s , φ ( k ) + Δ K d s , φ ( k ) ) E ϵ x s ( x ( k ) τ ( k ) )
where K φ ( k ) is the controller gain. Δ K φ ( k ) and K d s , φ ( k ) are the controller gain fluctuations that satisfy norm boundedness Δ K φ ( k ) = U 1 φ ( k ) O 1 ( k ) V 1 φ ( k ) and Δ K d φ ( k ) = U 2 φ ( k ) O 2 ( k ) V 2 φ ( k ) . U 1 φ ( k ) , U 2 φ ( k ) , V 1 φ ( k ) and V 2 φ ( k ) are known time-varying Matrices, O 1 ( k ) and O 2 ( k ) are an unknown continuous function satisfying O 1 T ( k ) O 1 ( k ) I and O 2 T ( k ) O 2 ( k ) I , used to characterize the uncertainty boundary of the attack. φ ( k ) S 2 = { 1 , , s 3 } can be governed by a DMC subject to TPM Ψ σ ( k + 1 ) = [ ψ p q σ ( k + 1 ) ] with ψ p q σ ( k + 1 ) defined by
Pr { φ ( k + 1 ) = q | φ ( k ) = p } = ψ p q σ ( k + 1 ) , p , q S 3 ,
where ψ ( k ) 0 and q = 1 s 3 ψ p q σ ( k + 1 ) = 1 .
Remark 1.
The random sequence α ( k ) obeys a Bernoulli distribution. It follows that Pr { α ( k ) = 1 } = α , Pr { α ( k ) = 0 } = 1 α with α [ 0 , 1 ] being the frequency of attacks: (1) α ( k ) = 1 implies that the transmission process is subjected to deception attacks, resulting in the removal of the desired measurement signal and its replacement with a bounded signal. (2) α ( k ) = 0 indicates that the desired quantized signal can be successfully transmitted through the system.
Define q ϖ ( k ) = [ q 1 , ϖ ( k ) , q 2 , ϖ ( k ) , , q n x , ϖ ( k ) ] T and u ( k ) = [ u 1 ( k ) , u 2 ( k ) , , u n u ( k ) ] , and then
u ( k ) = α ( k ) ( K φ ( k ) + Δ K φ ( k ) ) ( I + Δ ϖ ( k ) ) E ϵ x ( k ) + ( K d , φ ( k ) + Δ K d , φ ( k ) ) E ϵ x ( x ( k ) τ ( k ) )
Remark 2.
The non-fragile controller u ( k ) incorporates both the state x ( k ) and a time-varying delay term x ( k d ( k ) ) . The controller gain consists of two components: The terms Δ K φ ( k ) and Δ K d , φ ( k ) represent the bounded fluctuations of the controller gains. These perturbations account for numerical rounding errors in digital implementation and physical parameter drifts in actuator circuits. Incorporating these uncertainties into the design ensures that the system maintains H performance even when the controller is not implemented with infinite precision.
Remark 3.
It is noteworthy that the variable quantization density in this paper is regulated by a Markov chain. This modeling strategy aims to capture the stochastic nature of network bandwidth availability. In practical engineering, this corresponds to scenarios where senior network administrators allocate different quantization codebooks based on current traffic load. Although this is not a deterministic threshold-triggered adjustment, the Markov model provides a robust framework for stability analysis under random communication constraints.
Let σ ( k ) = a , ϖ ( k ) = m , φ ( k ) = p . By substituting the controller (8) into the system (1), we obtain
x ( k + 1 ) = A a E ϵ x ( k ) + ( B a + ( K d p + Δ K d p ) ) E ϵ ( x ( k ) τ ( k ) ) + ( 1 α ) C a ( K p + Δ K p ) E ϵ ( 1 + Δ m ) x ( k ) ( α ( k ) α ) C a ( K p + Δ K p ) E ϵ ( I + Δ m ) x ( k ) + D a w ( k )
Lemma 1
([9]). For given proper dimensioned matrices W a ( a = 1 , 2 , 3 ) that satisfies W 1 T = W 1 , the following inequality holds:
W 1 + W 2 W 3 + W 3 T W 2 T < 0 ,
then, if Z exists, the following holds:
W 1 + W 2 Z 1 W 2 T + W 3 T Z W 3 < 0 .
Lemma 2
([23]). For given proper dimensioned matrices M a ( a = 1 , 2 , 3 ) and a scalar ϵ ¯ > 0 , if
M 1 > 0 , M 3 < 0 , ϵ ¯ 2 M 1 + ϵ ¯ M 2 + M 3 < 0 .
then, the inequality:
ϵ 2 M 1 + ϵ M 2 + M 3 < 0 ,
holds for ϵ ( 0 , ϵ ¯ ] .
Definition 1
([24]). Given positive constants ϵ > 0 and e ( 0 , 1 ) . If it holds that:
E { x ( k ) 2 } ϵ e k E { x ( 0 ) 2 }
then system (9) is called stochastically finite-time exponential stable with external disturbance.
Definition 2
([25]). Given a positive scalar μ > 0 , if system (9) satisfies the following conditions for all nonzero w ( k ) l 2 [ 0 , ) when the initial conditions are zero:
E { k = 0 T y ( k ) 2 } < μ 2 E { k = 0 T ω ( k ) 2 }
where T is the upper bound of finite time, then the system is called a randomly stable system with w ( k ) disturbance decay.

3. Main Results

3.1. The Stochastically Finite-Time Exponential Stable Analysis

Theorem 1.
Suppose there are scalars μ > 0 , α [ 0 , 1 ] , β [ 0 , 1 ] and 0 < τ m τ M . If there exist symmetric positive definite matrices R a p > 0 and U a p > 0 , such that a , b S 1 , m , n S 2 , p , q S 3 :
U 0 H a m p T A ¯ a m p H a m p T B a p U α ¯ H a m p T E a p 0 ( E ϵ U a p E ϵ ) 1 0 E ϵ T D a E ϵ μ 2 I < 0 ,
β λ 1 ,
E ϵ T D a E ϵ < μ 2 I ,
where H a m p = [ π a 1 ϕ m 1 ψ p 1 1 I , , π a b ϕ m n ψ p q b I , , π a s 1 ϕ m s 2 ψ p s 3 s 1 I ] , α ¯ = α ( 1 α ) , λ 1 = λ max ( P a p ) , A ¯ a m p = A a + ( 1 α ) C a ( K p + Δ K p ) ( 1 + Δ m ) + F a T F a , B a p = B a + ( K d p + Δ K d p ) , E a p = C a ( K p + Δ K p ) E ϵ ( I + Δ m ) , U = d i a g { U 11 , , U b q , , U a p } .
Then the MJSPSs (SMJSclosed) satisfies the H performance stability.
Proof. 
The ensuing Lyapunov–Krasovskii functional is established as follows:
V ( k ) = x T ( k ) P σ ( k ) , φ ( k ) x ( k ) ,
where P σ ( k ) , φ ( k ) > 0 . ( σ ( k ) , φ ( k ) ) takes values in ( a , p ) , S 1 × S 2 and obeys the DMC it follows that
Pr { σ ( k + 1 ) = b , φ ( k + 1 ) = q σ ( k ) = a , φ ( k ) = p } = Pr { σ ( k + 1 ) = b σ ( k ) = a , δ k = p } × Pr { φ ( k + 1 ) = q σ ( k + 1 ) = b , σ ( k ) = a , ψ ( k ) = p } = π a b ψ p q b .
By evaluating the difference of V ( k ) in Equation (15), then the mathematical expectation manifests as
E { Δ V ( k ) } = E { V ( k + 1 ) V ( k ) } = E { x T ( k + 1 ) b S 1 , q S 2 Pr { σ ( k + 1 ) = b , φ ( k + 1 ) = q σ ( k ) = a , φ ( k ) = p } P b q x ( k + 1 ) x T ( k ) P a p x ( k ) } = E { x T ( k + 1 ) b S 1 π a b q S 2 ψ p q b P b q x ( k + 1 ) x T ( k ) P a p x ( k ) } = E { x T ( k + 1 ) P a p x ( k + 1 ) x T ( k ) P a p x ( k ) }
where P a p = b S 1 π a b q S 2 ψ p q b P b q . Combining Equation (1), one can get
E { Δ V ( k ) } = E { ξ T ( k ) Υ 1 a m p T E ϵ T P a p E ϵ Υ 1 a m p ξ ( k ) + ξ T ( k ) Υ 2 a m p T E ϵ T P a p E ϵ Υ 2 a m p ξ ( k ) + w T ( k ) E ϵ T D a E ϵ w T ( k ) ξ T ( k ) P a p ξ ( k ) }
where ξ ( k ) = [ x T ( k ) , x T ( k τ ( k ) ) ] , Υ 1 a m p = [ A a + ( 1 α ) C a ( K p + Δ K p ) ( 1 + Δ m ) , B a + ( K d p + Δ K d p ) ] , Υ 2 a m p = α ( 1 α ) [ C a ( K p + Δ K p ) ( I + Δ m ) , 0 ] .
Setting P a p = ( E ϵ U a p E ϵ ) 1 , one has
E { Δ V ( k ) } = E { ξ T ( k ) [ Υ 1 a m p T E ϵ T P a p E ϵ Υ 1 a m p + Υ 2 a m p T E ϵ T P a p E ϵ Υ 2 a m p + Υ 3 a p ] ξ ( k ) + w }
where w = λ max { E ϵ T D a E ϵ } w ¯ .
For any scalar β > 0 , it follows from Equation (12) that
E { Δ V ( k ) } β E { x ( k ) 2 } + E { w } .
According to Equation (15), we obtain
E { Δ V ( k ) } λ max ( P a p ) E { x ( k ) 2 } = λ 1 E { x ( k ) 2 } ,
E { Δ V ( k ) } λ min ( P a p ) E { x ( k ) 2 } = λ 2 E { x ( k ) 2 } .
Combining Equations (20) and (21), it can be derived for any scalar χ > 1 that the following equality holds:
χ k + 1 E { V ( x ( k + 1 ) ) } χ k E { V ( x ( k ) ) } = χ k + 1 ( E { V ( x ( k + 1 ) ) } E { V ( x ( k ) ) } ) + χ k ( χ 1 ) E { V ( x ( k ) ) } β χ k + 1 E { x ( k ) 2 } + χ k E { w } + χ k ( χ 1 ) β E { x ( k ) 2 } = χ k h ( χ ) E { x ( k ) 2 } + χ k E { w }
where h ( χ ) = β χ + λ 1 ( χ 1 ) . By summing both sides of Equation (23) from 0 to T 1 and rearranging yields
χ T V ( k ) V ( 0 ) h ( χ ) k = 0 T χ k e ( k ) 2 + χ ( χ T 1 ) χ 1 w
Due to V ( 0 ) β x ( 0 ) 2 . One can obtain
x ( k ) 2 h ( χ ) χ T λ 2 k = 0 T χ k x ( k ) 2 + χ ( χ T 1 ) χ 1 w + β χ T λ 2 x ( 0 ) 2
Evidently, lim χ h ( χ ) 0 . The above equation can be further simplified to
x ( k ) 2 β χ T λ 2 x ( 0 ) 2 + χ ( χ T 1 ) χ 1 w
which satisfies Definition 1, thereby ensuring that the system (9) can achieve exponential convergence.
Next, we analyze the H performance index of the system as follows:
J = E { Δ V ( k ) + y T ( k ) y ( k ) μ 2 w T ( k ) w ( k ) } .
Using the Schur complement, one has
J = E { ξ T ( k ) [ Υ ¯ 1 a m p T E ϵ T P a p E ϵ Υ ¯ 1 a m p + Υ 2 a m p T E ϵ T P a p E ϵ Υ 2 a m p + Υ 3 a p ] ξ ( k ) }
where Υ ¯ 1 a m p = [ A a + ( 1 α ) C a ( K p + Δ K p ) ( 1 + Δ m ) + F a T F a , B a + ( K d p + Δ K d p ) ] , Υ 3 a p = d i a g { P a p , E ϵ T D a E ϵ μ 2 I } .
Recalling (12), it can be obtained that
E { Δ V ( k ) + y T ( k ) y ( k ) μ 2 w T ( k ) w ( k ) } 0 .
By summing both sides of Equation (29) from 0 to ∞, it has
E { k = 0 y T ( k ) y ( k ) μ 2 k = 0 w T ( k ) w ( k ) } E { V ( 0 ) V ( ) } .
With zero initial conditions, we obtain
E { k = 0 y T ( k ) y ( k ) μ 2 k = 0 w T ( k ) w ( k ) .
Evidently, the H performance condition (9) is met. □

3.2. Controller Design

Theorem 2.
Suppose there are scalars μ > 0 , α [ 0 , 1 ] , β [ 0 , 1 ] and 0 < τ m τ M . If there exist symmetric positive definite matrices Ω a p , U a p > 0 , and matrices K p , K d p , U 1 p , V 1 p , U 2 p , V 2 p , Y a p , Z a p with proper dimensions, such that a , b S 1 , m , n S 2 , p , q S 3 , ι = 1 , 2 :
Σ a p Ω a p 1 R c Ω a p 2 T Ξ e R c 0 R c < 0 ,
where
Σ a p = U 0 H a m p T A ˜ a p H a m p T B ˜ a p U α ¯ H a m p T E ˜ a p 0 Θ a p ι 0 E ϵ T D a E ϵ μ 2 I < 0 ,
U = d i a g { U 11 , , U b q , , U a p } , H a m p = [ π a 1 ϕ m 1 ψ p 1 1 I , , π a b ϕ m n ψ p q b I , , π a s 1 ϕ m s 2 ψ p s 3 s 1 I ] , A ˜ a p = A a Y a p + ( 1 α ) C a ( K p + U 1 p V 1 p ) + F a T F a , B ˜ a p = B a Z a p + ( K d p + U 2 p V 2 p ) , E ˜ a p = C a ( K p + U 1 p V 1 p ) , α ¯ = α ( 1 α ) , λ 1 = λ max ( P a p ) , Ω a m p 1 = [ ( 1 α ) π a 1 ϕ m 1 ψ p 1 1 B a T , , ( 1 α ) π a s 1 ϕ m s 2 ψ p s 3 s 1 B a T , α ¯ π a 1 ϕ m 1 ψ p 1 1 B a T , , α ¯ π a s 1 ϕ m s 2 ψ p s 3 s 1 B a T , 0 , 0 ] , Ω a m p 2 = [ 0 , , 0 , 0 , , 0 , K p , 0 ] , Θ a p 1 = E ϵ U a p E ϵ Y a p T Y a p , Θ a p 2 = I 1 U a p I 1 Y a p T Y a p .
Then the MJSPSs (9) satisfies the H performance stability. The controller gain is given by the following equation:
K p = K p Y a p 1 , K d p = K d p Z a p 1 .
Proof. 
Applying the Schur complement, Equation (32) can be simplified to
Σ a p + a p 1 R q a p 1 T + a p 2 T Λ R q 1 Λ a p 2 < 0 ,
it further follows that
Σ a p + a p 1 R q a p 1 T + a p 2 T Δ R q 1 Δ a p 2 < 0
From Lemma 1, we have
Σ a p + a p 1 Δ a p 2 + a p 2 T Δ a p 1 T < 0
Equation (36) with ι = 1 can be equivalently rewritten as
κ ¯ 2 0 0 Ξ a p 1 + κ ¯ 0 0 Ξ a p 2 + Υ a p 11 Υ a p 12 Ξ a p 3 < 0
where
Υ a p 11 = diag { U , U } , Υ a p 12 = H a m p T A a m p Y a p H a m p T B a p Z a p H a m p T D a Y a p α ¯ H a m p T E a p Y a p 0 0 , I 1 = I n 1 0 0 , I 2 = 0 0 I n 2 , Ξ a p 1 = I 2 U a p I 2 0 0 Ξ a p 2 = I 1 U a p I 2 + I 2 U a p I 1 0 0 , Ξ a p 3 = I 1 U a p I 1 Y a p T Y a p 0 I 1 T D a I 1 μ 2 I .
Due to U a p > 0 , one obtains
0 0 Ξ a p 1 > 0 .
Similarly, for Equation (36) with ι = 2 , it can be derived that
Υ a p 11 Υ a p 12 Ξ a p 3 < 0 .
From Lemma 2, it follows that
κ 2 0 0 Ξ a p 1 + κ 0 0 Ξ a p 2 + Υ a p 11 Υ a p 12 Ξ a p 3 < 0 ,
that is
Υ a p 11 Υ a p 12 Υ a p 22 < 0 ,
where Υ a p 22 = d i a g { E ϵ U a p E ϵ Y a p T Y a p , E ϵ T D a E ϵ μ 2 I } . Applying inequality E ϵ U a p E ϵ Y a p T Y a p Y a p T ( E ϵ U a p E ϵ ) Y a p , it implies that
Υ a p 11 Υ a p 12 Υ ¯ a p 22 < 0 ,
where Υ ¯ a p 22 = d i a g { Y a p T ( E ϵ U a p E ϵ ) Y a p , E ϵ T D a E ϵ μ 2 I } .
Pre- and postmultiplying (41) by d i a g { I , , I , Y a p T , Z a p T , I } and its transposition. Clearly, by (12), (42) holds. □

4. Examples

Consider an inverted pendulum system controlled by a DC motor through gear transmission [14,26], whose dynamic model can be described as
x ˙ 1 ( t ) = x 2 ( t ) x ˙ 2 ( t ) = g l sin ( x 1 ( t ) ) + N K m m l 2 x 3 ( t ) L p x ˙ 3 ( t ) = K p N p x 2 ( t ) R p x 3 ( t ) + u ( t ) + w ( t )
where x 2 ( t ) = θ ˙ p ( t ) is the angular velocity of the pendulum arm in the vertical direction. g is the gravitational constant, l represents the axis length, x 2 ( t ) = θ ˙ p ( t ) is the angle between the pendulum arm and the vertical direction, the gear ratio is expressed as N r , the motor torque constant is K m , and x 3 ( t ) = I a ( t ) is the motor current. Other system parameters include inductance L a , motor torque constant K b , resistance R i , control input voltage u ( t ) , and external disturbance w ( t ) . The specific values of the parameters are as follows: g = 9.8 m / s 2 , K m = 0.1 N × m / s , K b = 0.1 V × s / rad , N = 10 , l = 1 m , L a = 50 mH . By setting the singular perturbation parameter ϵ = L a inductance, the linear model of the system can be obtained:
E ϵ x ˙ ( t ) = A σ ( t ) x ( t ) + B σ ( t ) E ϵ ( x ( t ) τ ( t ) ) + C σ ( t ) u ( t ) + D σ ( t ) w ( t ) ,
where A 1 = 0 1 0 g l 0 N K m m l 2 0 K b N r R 1 , A 2 = 0 1 0 g l 0 N K m m l 2 0 K b N r R 2 , B 1 = D 1 = 0 1 1 , B 2 = D 2 = 0 0.5 0.5 , C 1 = 0.5 I , C 2 = 0.1 I , E ϵ = diag { 1 , 1 , ϵ } .
According to the Euler discrete method, by discretizing the continuous system with a sampling period of T = 0.08 s , we can obtain the parameters of the singular Markov jump discrete complex network as follows:
E ϵ x ( k + 1 ) = A a x ( k ) + B a E ϵ ( x ( k ) τ ( k ) ) + C a u ( k ) + D a w ( k ) ,
where A 1 = 1.0313 0.0796 0.0020 0.7805 0.9913 0.0397 0.0196 0.0397 0.0089 , A 2 = 1.0313 0.0797 0.0018 0.7812 0.9944 0.0354 0.0181 0.0354 0.0063 , B 1 = D 1 = 0.0239 0.7993 0.7818 , B 2 = D 2 = 0.0180 0.5596 0.4708 , C 1 = 0.5 I , C 2 = 0.1 I , E ϵ = diag { 1 , 1 , 0.05 } .
The Markov jump modes of the system, quantizer, and controller are shown in Figure 1, and the transition probabilities are controlled by the following transition probability matrix: Γ 1 = 0.30 0.70 0.50 0.50 , Γ 2 1 = 0.40 0.60 0.60 0.40 , Γ 2 2 = 0.70 0.30 0.65 0.35 , Γ 3 = 0.25 0.75 0.55 0.45 .
In the simulation, the external disturbance w ( k ) is chosen as an exponentially decaying signal: 0.05 exp ( 1.16 k ) sin ( 0.9 π k ) . time delay τ ( k ) is [ sin ( k π / 2 ) + 1 ] , The quantizer parameters ρ 1 and ρ 2 are 0.9 and 0.75, respectively. Other parameters are set as follows: O 1 ( k ) = 0.05 cos ( k ) , O 2 ( k ) = sin ( k ) , U 11 = [ 0.02 , 0.01 , 0.01 ] , U 12 = [ 0.03 , 0.04 , 0.02 ] , U 21 = [ 0.10 , 0.10 , 0.10 ] , U 22 = [ 0.20 , 0.20 , 0.20 ] , V 11 = 0.03 0 0 0 0.03 0 0 0 0.026 , V 12 = 0.04 0 0 0 0.03 0 0 0 0.018 , V 21 = 0.1 0 0 0 0.1 0 0 0 0.05 , and V 22 = 0.2 0 0 0 0.2 0 0 0 0.15 .
By solving the linear matrix inequality in Theorem 2, we can obtain the controller gain as
K 1 = [ 15.2679 1.9610 0.0100 ] , K 2 = [ 10.0853 1.5000 0.1500 ] , K d 1 = [ 19.04541.044510.8901 ] , K d 2 = [ 0.12520.14578.8815 ] ,
The system generates random sequences to produce target node values within the range [0, 1]. As illustrated in Figure 2, in the absence of a controller, the state trajectories of individual nodes exhibit divergent behavior and cannot be effectively tracked. An in-depth analysis of experimental data from the closed-loop system, presented in Figure 3, Figure 4 and Figure 5, demonstrates the performance under complex operating conditions, including external disturbances and actuator failures. Figure 4 shows the simulation of 100 of the control output curves and DoS attack sequences. The results indicate that the four network nodes successfully achieve rapid tracking of the target node’s state trajectory by employing the designed non-fragile controller parameters. Furthermore, as shown in Figure 3, Figure 4 and Figure 5, the state error between the four network nodes and the target node converges to a bounded region within a finite time, T = 20 s. Figure 6 shows the state x T ( k ) x ( k ) curve under different attack frequencies α ( k ) . These experimental results confirm the effectiveness and robustness of the proposed control method. As illustrated in Figure 7, the state trajectories x T ( k ) x ( k ) are compared with and without external disturbance. It is evident that the disturbance injects additional energy into the system, resulting in higher peaks during the transient phase. However, under the proposed non-fragile H control, the system effectively suppresses this spectral energy, and the state trajectories rapidly converge to zero, satisfying the robust performance requirements.
To further highlight the advantages of the proposed strategy, this study employs a comparative experiment using the classical fixed quantization density method [7,17,22]. As shown in Figure 8, the proposed method with variable quantization density demonstrates faster convergence and superior interference suppression capabilities. This confirms that the ability to dynamically adjust quantization density enables the controller to maintain high performance even under Markov mode modeling, whereas the fixed strategy struggles to adapt.

5. Conclusions

This study addresses the asynchronous non-fragile H control problem for time-delayed MJSPSs with variable quantization density and DoS attacks. By modeling the asynchronous dynamics between the system and controller modes using independent Markov chains, a robust control framework is proposed to ensure stochastic finite-time exponential stability and H performance under conditions of delay, singular disturbances, and quantization uncertainty. Sufficient conditions are derived based on mode-dependent Lyapunov–Krasovskii functions, enabling the design of non-fragile controller gains to enhance system robustness. The effectiveness of this method is validated in bandwidth-constrained network environments. Future research will explore extending this framework to hidden-Markov jump singular disturbance systems and combining it with adaptive quantization strategies to further optimize performance under complex communication constraints.

Author Contributions

Conceptualization, Y.Q., X.W. and Y.L.; methodology, Y.L.; software, H.X. and Y.L.; validation, Y.Q., X.W., H.X., L.H. and Y.L.; formal analysis, L.H. and Y.L.; investigation, X.W., H.X. and L.H.; resources, Y.Q., X.W. and H.X.; data curation, Y.Q. and X.W., writing—original draft preparation, Y.L.; writing—review and editing, Y.Q., X.W. and Y.L.; supervision, Y.Q., X.W., H.X. and L.H.; funding acquisition, Y.Q., X.W. and H.X. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China (62263005), the Key Laboratory of AI and Information Processing (Hechi University), the Education Department of Guangxi Zhuang Autonomous Region (2022GXZDSY004, 2024GXZDSY013), the Innovation Project of Guangxi Graduate Education (YCBZ2025152), and the Innovation Project of GUET Graduate Education (2025YCXS138).

Data Availability Statement

The data that support the findings of this study are available within the article.

Conflicts of Interest

The authors have no conflicts to disclose.

References

  1. Zhang, Z.; Zhang, K.; Xie, X.; Stojanovic, V. ADP-based prescribed-time control for nonlinear time-varying delay systems with uncertain parameters. IEEE Trans. Autom. Sci. Eng. 2024, 22, 3086–3096. [Google Scholar] [CrossRef]
  2. Xue, Y.; Tu, K.; Liu, C.; Zhang, X. Non-fragile extended dissipative synchronization control for uncertain discrete-time neural networks with leakage and unbounded time-varying delays. Chaos Solitons Fractals 2024, 185, 115072. [Google Scholar] [CrossRef]
  3. Anbalagan, P.; Feng, Z.; Huang, T.; Cui, Y. Mean-square synchronization of additive time-varying delayed markovian jumping neural networks under multiple stochastic sampling. IEEE Trans. Neural Netw. Learn. Syst. 2025, 36, 11928–11942. [Google Scholar] [CrossRef]
  4. Zhang, W.; Zhong, S.; Jiang, X. Finite-time annular domain stability and asynchronous H control for stochastic switching Markov jump systems. IEEE Trans. Autom. Control 2024, 69, 6277–6284. [Google Scholar] [CrossRef]
  5. Wang, G.; Zhang, Y.; Li, J. The multiobjective optimization problem of guaranteed cost control for semi-Markovian jump systems through networks. IEEE Trans. Ind. Inf. 2025, 22, 1974–1985. [Google Scholar] [CrossRef]
  6. Jiao, C.; Zhou, J. Non-fragile finite time H control for nonlinear singular Markovian jump systems with parameter uncertainties and generally uncertain transition rates. Nonlinear Dyn. 2025, 113, 6717–6737. [Google Scholar] [CrossRef]
  7. Cheng, J.; Wu, Y.; Wu, Z.-G.; Yan, H. Nonstationary filtering for fuzzy markov switching affine systems with quantization effects and deception attacks. IEEE Trans. Syst. Man Cybern. Syst. 2022, 52, 6545–6554. [Google Scholar] [CrossRef]
  8. Wu, Y.; Yan, H.; Wang, M.; Li, Z.; Cheng, J. Dissipative estimating for nonlinear markov systems with protocol-based deception attacks and measurement quantization. IEEE Trans. Cybern. 2025, 55, 1731–1743. [Google Scholar] [CrossRef]
  9. Cheng, J.; Wang, Y.; Park, J.H.; Cao, J.; Shi, K. Static output feedback quantized control for fuzzy Markovian switching singularly perturbed systems with deception attacks. IEEE Trans. Fuzzy Syst. 2022, 30, 1036–1047. [Google Scholar] [CrossRef]
  10. Xu, J.; Cheng, J.; Chadli, M.; Qi, W. Protocol-based smc for fuzzy semi-markov switching systems with multizone probabilistic time-varying delays. IEEE Trans. Syst. Man Cybern. Syst. 2025, 55, 3026–3035. [Google Scholar] [CrossRef]
  11. Aslam, M.S.; Bilal, H.; Chang, W.; Kumar, N.; Khan, I.A.; Vasilakos, A.V. H∞ delayed filtering of markov jump fuzzy systems in consumer electronics: Input–output analysis. IEEE Trans. Consum. Electron. 2025, 71, 7002–7013. [Google Scholar] [CrossRef]
  12. Luo, W.; Chen, H.; Zong, G.; Zhao, X.; Kong, Q. Observer-based extended dissipative dynamic probabilistic event-triggered control of Markov jump systems subject to failures and cyber-attacks. Nonlinear Dyn. 2025, 113, 9823–9838. [Google Scholar] [CrossRef]
  13. Tan, Y.; Liu, J.; Xie, X.; Tian, E.; Liu, J. Dynamic-memory event-triggered sliding-mode secure control for nonlinear semi-markov jump systems with stochastic cyber attacks. IEEE Trans. Autom. Sci. Eng. 2025, 22, 202–214. [Google Scholar]
  14. Zhou, X.; Tang, Y.; Cheng, J.; Cao, J.; Xue, C.; Yan, D. Nonstationary quantized control for discrete-time Markov jump singularly perturbed systems against deception attacks. J. Franklin Inst. 2021, 358, 2915–2932. [Google Scholar] [CrossRef]
  15. Guo, F.; Luo, M.; Cheng, J.; Wang, X.; Shi, K. Quantization-based tracking control for fuzzy singularly perturbed Markov jump systems with incomplete transition information and packet dropout. Nonlinear Dyn. 2023, 111, 9255–9273. [Google Scholar] [CrossRef]
  16. Xiao, N.; Xie, L.; Fu, M. Stabilization of Markov jump linear systems using quantized state feedback. Automatica 2010, 46, 1696–1702. [Google Scholar] [CrossRef]
  17. Zhou, J.; Dong, J.; Xu, S. Asynchronous dissipative control of discrete-time fuzzy Markov jump systems with dynamic state and input quantization. IEEE Trans. Fuzzy Syst. 2023, 31, 3906–3920. [Google Scholar] [CrossRef]
  18. Tao, J.; Lu, R.; Su, H.; Shi, P.; Wu, Z.G. Asynchronous filtering of nonlinear Markov jump systems with randomly occurred quantization via T–S fuzzy models. IEEE Trans. Fuzzy Syst. 2017, 26, 1866–1877. [Google Scholar] [CrossRef]
  19. Zhang, J.; Ma, Y. Event-triggered dissipative double asynchronous controller for interval type-2 fuzzy semi-Markov jump systems with state quantization and actuator failure. ISA Trans. 2023, 138, 226–242. [Google Scholar] [CrossRef]
  20. Wang, Y.; Yan, H.; Park, J.H.; Hu, Y.; Shen, H. Asynchronous control of cyber–physical systems with quantized measurements and stochastic multimode attacks. IEEE Trans. Cybern. 2025, 55, 3390–3402. [Google Scholar] [CrossRef] [PubMed]
  21. Wu, S.; Xiao, Z.; Zheng, Q. Asynchronous resilient H control of discrete-time switched T-S fuzzy systems via quantized inputs. Int. J. Fuzzy Syst. 2025. [Google Scholar] [CrossRef]
  22. Ram Kumar, B.; Balasubramaniam, P. Asynchronous quantized control for discrete-time Markov jump power systems under deception attacks. J. Appl. Math. Comput. 2026, 72, 61. [Google Scholar] [CrossRef]
  23. Cheng, J.; Huang, W.; Lam, H.-K.; Cao, J.; Zhang, Y. Fuzzy-model-based control for singularly perturbed systems with nonhomogeneous Markov switching: A dropout compensation strategy. IEEE Trans. Fuzzy Syst. 2022, 30, 530–541. [Google Scholar] [CrossRef]
  24. Zhao, Y.; Wang, L.; Xie, X.; Lam, H.-K. Finite-time asynchronous switching control for fuzzy markov jump systems by applying polynomial membership functions. IEEE Trans. Circuits Syst. I Reg. Pap. 2024, 71, 5607–5617. [Google Scholar] [CrossRef]
  25. Xia, W.; Zhang, L.; Ma, J.; Li, Y.; Du, S. Non-fragile H∞ filtering for delayed discrete-time Markov jump systems: An adaptive event-triggered strategy. J. Franklin Inst. 2024, 361, 106781. [Google Scholar] [CrossRef]
  26. Li, F.; Xu, S.; Zhang, B. Resilient asynchronous H∞ control for discrete-time Markov jump singularly perturbed systems based on hidden Markov model. IEEE Trans. Syst. Man Cybern. Syst. 2020, 50, 2860–2869. [Google Scholar] [CrossRef]
Figure 1. Markov jump mode of the system, quantizer, and controller.
Figure 1. Markov jump mode of the system, quantizer, and controller.
Entropy 28 00317 g001
Figure 2. The state trajectory of the MJSPSs without controller.
Figure 2. The state trajectory of the MJSPSs without controller.
Entropy 28 00317 g002
Figure 3. The state trajectory of the closed-loop MJSPSs.
Figure 3. The state trajectory of the closed-loop MJSPSs.
Entropy 28 00317 g003
Figure 4. The control output curves and its average value in 100 simulation. The dark blue color represents the results of 100 simulations. The light blue color represents the DOS attack sequence.
Figure 4. The control output curves and its average value in 100 simulation. The dark blue color represents the results of 100 simulations. The light blue color represents the DOS attack sequence.
Entropy 28 00317 g004
Figure 5. Comparison of the state input and quantization input curves.
Figure 5. Comparison of the state input and quantization input curves.
Entropy 28 00317 g005
Figure 6. The state x T ( k ) x ( k ) curve under different attack frequencies.
Figure 6. The state x T ( k ) x ( k ) curve under different attack frequencies.
Entropy 28 00317 g006
Figure 7. The state x T ( k ) x ( k ) curve with and without disturbance.
Figure 7. The state x T ( k ) x ( k ) curve with and without disturbance.
Entropy 28 00317 g007
Figure 8. The state x T ( k ) x ( k ) curve under quantization density. Method 1 represents the fixed quantization density method [7,17,22], where ρ = 0.75. The quantitative densities of the method proposed in this article are ρ 1 = 0.95 and ρ 2 = 0.75.
Figure 8. The state x T ( k ) x ( k ) curve under quantization density. Method 1 represents the fixed quantization density method [7,17,22], where ρ = 0.75. The quantitative densities of the method proposed in this article are ρ 1 = 0.95 and ρ 2 = 0.75.
Entropy 28 00317 g008
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Qin, Y.; Wu, X.; Xiao, H.; Huang, L.; Lu, Y. Asynchronous Non-Fragile H Control for Time-Delay Markovian Jump Singularly Perturbed Systems with Variable Quantization Density and DoS Attack. Entropy 2026, 28, 317. https://doi.org/10.3390/e28030317

AMA Style

Qin Y, Wu X, Xiao H, Huang L, Lu Y. Asynchronous Non-Fragile H Control for Time-Delay Markovian Jump Singularly Perturbed Systems with Variable Quantization Density and DoS Attack. Entropy. 2026; 28(3):317. https://doi.org/10.3390/e28030317

Chicago/Turabian Style

Qin, Yong, Xiru Wu, Haolin Xiao, Lihong Huang, and Yi Lu. 2026. "Asynchronous Non-Fragile H Control for Time-Delay Markovian Jump Singularly Perturbed Systems with Variable Quantization Density and DoS Attack" Entropy 28, no. 3: 317. https://doi.org/10.3390/e28030317

APA Style

Qin, Y., Wu, X., Xiao, H., Huang, L., & Lu, Y. (2026). Asynchronous Non-Fragile H Control for Time-Delay Markovian Jump Singularly Perturbed Systems with Variable Quantization Density and DoS Attack. Entropy, 28(3), 317. https://doi.org/10.3390/e28030317

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop