Next Article in Journal
Design and Construction of UAV-Based Measurement System for Water Hyperspectral Remote-Sensing Reflectance
Previous Article in Journal
Performance Evaluation of Monocular Markerless Pose Estimation Systems for Industrial Exoskeletons
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Non-Fragile Estimation for Nonlinear Delayed Complex Networks with Random Couplings Using Binary Encoding Schemes

1
Sanya Offshore Oil & Gas Research Institute, Northeast Petroleum University, Sanya 572025, China
2
Artificial Intelligence Energy Research Institute, Northeast Petroleum University, Daqing 163318, China
3
National Key Laboratory of Continental Shale Oil, Northeast Petroleum University, Daqing 163318, China
4
Heilongjiang Provincial Key Laboratory of Networking and Intelligent Control, Northeast Petroleum University, Daqing 163318, China
5
Research Center for Mathematics and Interdisciplinary Sciences, Northeast Petroleum University, Daqing 163318, China
6
Sinopec Qilu Petrochemical Company, Zibo 255400, China
7
School of Electrical & Information Engineering, Northeast Petroleum University, Daqing 163318, China
*
Author to whom correspondence should be addressed.
Sensors 2025, 25(9), 2880; https://doi.org/10.3390/s25092880
Submission received: 18 March 2025 / Revised: 24 April 2025 / Accepted: 30 April 2025 / Published: 2 May 2025
(This article belongs to the Section Intelligent Sensors)

Abstract

This paper is dedicated to dealing with the design issue of a non-fragile state estimator for a type of nonlinear complex network subject to random couplings and random multiple time delays under binary encoding schemes (BESs). The BESs are put into use in the transmission of data from the sensor to the remote estimator. The phenomenon of bit errors is considered in the process of signal transmission, whose description utilizes a Bernoulli-distributed random sequence. The random couplings are represented by using the Kronecker delta function as well as a Markov chain. This paper aims to conduct a non-fragile state estimation such that, in the presence of some variations/perturbations in the gain parameter of the estimator, the estimation error dynamics will reach exponential ultimate boundedness in mean square and the ultimate bound will be minimized. Utilizing both stochastic analysis and matrix inequality processing, a sufficient condition is provided to guarantee that the constructed estimator satisfies the expected estimation performance, and the estimator gains are acquired by tackling an optimization issue constrained by some linear matrix inequalities. Eventually, two simulation examples are conducted, whose results verify that the approach to the design of a non-fragile estimator in this paper is effective.

1. Introduction

Complex networks (CNs) are large-scale networked systems comprising numerous network nodes, which are distributed and connected in terms of a specific coupling structure [1,2,3,4]. CNs have attracted sustained interest from researchers in the field of systems and control due to their remarkable description/abstraction ability in numerous practical networks, including gene networks, power grids, transport networks, and artificial neural networks, and some representative results are provided in the references [5,6,7,8,9]. In the last decade, there has been a large body of research dedicated to investigating the issues in the dynamic analysis of CNs, including synchronization issues [10,11], stability analyses issues [12,13], state estimation (SE) issues [14,15], and others. It is important to highlight that studying CNs requires access to state information within the various nodes. However, measuring the network state directly from the sensor output measurements can pose challenges, especially in large-scale networks where information may be incomplete. Hence, the issues in SE for CNs, including variance-constrained SE, non-fragile SE, H SE, minimum-variance SE, and recursive SE [16,17,18,19,20], have attracted a substantial amount of attention. For example, the variance-constrained SE problem has been investigated in [16] for a class of CNs involving quantized measurements and uncertain inner coupling. In [19], the randomly occurring sensor saturations were the focus, and a non-fragile state estimator of CNs was designed based on a dynamic event-triggering mechanism.
In practical networked control systems (NCSs), constraint phenomena inevitably occur due to the limited bandwidth, sensor failures, and complex operating environments, which may include system constraints (nonlinearity, time-delays, input saturation, and noise), measurement constraints (sensor saturation and sensor faults), and communication constraints (cyber attacks and channel fadings) [21,22,23,24,25,26,27,28]. The overall performance of CNs may be impacted more significantly by the constraint phenomena due to their intricate structure, which includes a topology of different network nodes and a coupling structure within a single node [29,30]. It is widely recognized that the outer coupling of a CN reflects the topology linkage among neighboring nodes, and the inner coupling depicts the intensity of the internal connections in an individual node. However, the coupling matrices are sometimes variable or unknown due to possible errors in modeling CNs, component aging, and changing working conditions [31]. Although the complexity of the coupling matrix makes it harder to analyze the dynamics of CNs, it is essential to take account of the impact of random couplings while analyzing the dynamic behavior of CNs. Research on constraint phenomena in CNs has received increasing interest [32,33,34]. For instance, the phenomena of uncertain inner coupling, sensor saturation, quantization, and missing measurements were contemplated regarding the SE problem for CNs in [34]. Due to the inadequate research results obtained, it is meaningful to conduct in-depth studies on the SE issue for CNs using random couplings, which is an objective of this paper.
For NCSs, communication transmission often takes up a large number of network resources, and the transmission data may be stolen by cyber hackers; thus, reducing the consumption of network resources in the communication process and ensuring the security of the data being communicated has become an urgent need. Compared to information transmission using analog signals among NCSs devices, communicating in a digital way has benefits including powerful resistance to noise disturbances, the high reliability of data transmission, and high confidentiality [35,36,37,38,39,40,41]. To date, various communication schemes have been adopted to decrease the consumption of communication resources, such as the communication protocol [42,43,44,45,46,47] and the event-triggering strategy [48,49,50]. Most existing data transmission strategies aim to alleviate the congestions and conflicts associated with transmission by reducing the communication traffic in the transmission channels or the frequency of data transmission.
In recent years, another communication mechanism has been widely studied, i.e., the encoding–decoding scheme [51,52,53,54], where the binary encoding scheme (BES), a traditional method, has been applied in the SE issue of NCSs [15,55,56]. The core idea of the BESs is to encode the data through a binary encoder as a binary bit string (BBS), which is to be transmitted via a binary symmetric channel (BSC) and then decoded by a binary decoder at the receiving end of the data. The use of BESs for transmission has allowed for data compression, reduced the communication bandwidth to an extent, and enhanced the security of data communication. Despite these advantages, distortion also occurs during data transmission using BESs. During the transmission of the BBS through a BSC, bit flipping inevitably occurs to a binary bit due to the presence of channel noise, e.g., a change from 0 to 1 or a change from 1 to 0. This phenomenon is also known as the bit error, which brings additional challenges to the analysis of CNs dynamics. If not dealt with properly when conducting the analysis, bit error may have a negative effect on both the correctness of data transmission and, inevitably, the estimator performance [15,56,57,58]; furthermore, investigations into the estimation of CNs using BESs have only recently become the subject of research. Hence, another objective of this paper was to study the SE issue for CNs using BESs while analyzing the impact of random bit errors on the estimator performance.
As is known, non-fragile SE issues with NCSs typically arise regarding the possible occurrence of fluctuations in gain in the actual execution course, which are caused by working environment effects or abrupt changes. In most of the literature on SE for CNs, the results were obtained by assuming that the constructed state estimators are accurate and realizable [59,60,61]. However, this assumption may be unrealistic for practical systems due to various factors interfering with the actual process, such as the aging of electronic components within the device or the inaccurate implementation of the digital system. That is, the implemented estimator gain parameters may deviate from the expected value to an unpredictable degree, which would sometimes cause severe estimation errors in the system. Therefore, the development of a non-fragile estimator that can resist these gain perturbations is necessary; this could involve including gain variations prior to estimation in the estimator model. At present, the non-fragile estimation issue is receiving increasing attention [19,62,63,64,65]. For instance, in [64], a H non-fragile estimator was designed to deal with the fault estimation issue for a type of system with time-varying parameters over sensor networks. Nevertheless, non-fragile estimator designs for CNs have not been paid enough attention yet in which BESs, random couplings, and random multiple time delays are all taken into account simultaneously.
In response to these issues, our study aims to address the non-fragile SE problem for delayed CNs with randomly varying couplings under BESs. The crucial difficulties to be resolved through the developed non-fragile estimation strategy are as follows: (1) How can one characterize and describe the randomly varying couplings of CNs? (2) How can the influence from bit errors on SE performance be indicated? (3) How can a non-fragile estimator be devised that satisfies the exponential ultimate boundedness in mean squares? The highlights of this paper are emphasized as follows: (1) the non-fragile SE issue is effectively tackled in this paper for nonlinear CNs, which encompass randomly occurring multiple delays and randomly varying couplings under the BESs; (2) a sufficient condition is brought up, which is used to design the non-fragile estimator, guarantee the exponential ultimate boundedness of the SE error dynamics in mean square, and derive the minimized ultimate bound of the estimation error; and (3) the estimator gain parameters are acquired via tackling an optimization issue constrained by some linear matrix inequalities.
Notation: The symbol appearing in this paper is fairly normalised. R n is the n-dimensional Euclidean space. · indicates the standard norm. For a square matrix A, A 1 , tr { A } , φ min ( A ) ( φ max ( A ) ), and A > 0 ( A 0 ) reveal the inverse of A, the trace of A, the minimum (maximum) eigenvalue of A, and A is positive-definite (positive semi-definite), respectively. B T means the transpose of matrix B. The symbol ⊗ expresses the Kronecker product. I ( n ) ( 0 ( r × o ) ) represents the identity (zero) matrix with the dimension n × n ( r × o ). For a random variable/vector w, V w and E w symbolise its variance and expectation, respectively. diag { } describes a diagonal matrix.

2. Problem Formulation and Preliminaries

2.1. The Mathematical Description of Network Nodes

A class of discrete-time delayed CNs with U nodes were used, as follows:
x i ( s + 1 ) = A i x i ( s ) + B b i l = 1 m ϶ i l ( s ) x i ( s b l ( s ) ) + E i g ( x i ( s ) ) + ζ = 1 p j = 1 U δ ( ϰ ( s ) , ζ ) a i j ( ζ ) Γ ( ζ ) x j ( s ) + F i w i ( s ) ( i = 1 , 2 , , U )
where x i ( s ) R l x denotes the state vector of node i; w i ( s ) R l w is the process noise depicted by a bounded stochastic noise sequence fulfilling E w i ( s ) = 0 and V w i ( s ) = w 0 2 I ( l w ) with a scalar w 0 > 0 ; A i , B b i , E i and F i are the given system parameters matrices with suitable dimensions; and Λ ( ζ ) = [ a i j ( ζ ) ] U × U ( ζ = 1 , 2 , , p ) is the outer coupling configuration matrix of CN (1) with a i j ( ζ ) 0 ( i j ) but not all zero. Generally, Λ ( ζ ) is symmetric (i.e., Λ ( ζ ) = Λ ( ζ ) T ) and satisfies
j = 1 U a i j ( ζ ) = j = 1 U a j i ( ζ ) = 0 ( i = 1 , 2 , , U , ζ = 1 , 2 , , p ) .
Γ ( ζ ) = diag { α 1 ( ζ ) , α 2 ( ζ ) , , α l x ( ζ ) } 0 is the inner coupling matrix linking the th ( = 1 , 2 , , l x ) state variable if α 0 ; δ ( ϰ ( s ) , ζ ) is the Kronecker delta function, as follows:
δ ( ı , ) = 1 , if ı = 0 , if ı .
ϰ ( s ) is a stochastic variable that represents randomly varying couplings of CN (1), which conforms to a discrete-time homogeneous Markov chain with values in a finite state space, as follows:
= { 1 , 2 , , p }
and Π = [ π a b ] p × p symbolises a transition probability matrix with elements denoted by
π a b = Prob { ϰ ( s + 1 ) = b | ϰ ( s ) = a } .
Assumption 1
([5]). g ( · ) R l x is a nonlinear vector-valued function with g ( 0 ) = 0 , which meets
[ g ( z 1 ) g ( z 2 ) Ξ 1 ( z 1 z 2 ) ] T [ g ( z 1 ) g ( z 2 ) Ξ 2 ( z 1 z 2 ) ] 0 , z 1 , z 2 R l x .
In the term l = 1 m ϶ i l ( s ) x i ( s b l ( s ) ) , b l ( s ) ( l = 1 , 2 , , m ) characterizes the stochastic and time-varying essence of communication delays that meet the condition 0 < b ̲ b l ( s ) b ¯ , where b ̲ and b ¯ are known and stand for the lower and upper bounds of delays. ϶ i l ( s ) is a random variable represented by a Bernoulli distribution, as follows:
Prob { ϶ i l ( s ) = 1 } = ϶ ¯ i l , Prob { ϶ i l ( s ) = 0 } = 1 ϶ ¯ i l .
Denoting ϶ ˜ i l ( s ) ϶ i l ( s ) ϶ ¯ i l , we can obtain the following statistical properties:
E ( ϶ i l ( s ) ϶ ¯ i l ) 2 = E ( ϶ ˜ i l ( s ) ) 2 = ϶ ¯ i l ( 1 ϶ ¯ i l ) .
Therefore, the dynamics of CN (1) can be rewritten as follows:
x i ( s + 1 ) = A i x i ( s ) + ζ = 1 p j = 1 U δ ( ϰ ( s ) , ζ ) a i j ( ζ ) Γ ( ζ ) x j ( s ) + B b i l = 1 m ϶ ˜ i l ( s ) x i ( s b l ( s ) ) + B b i l = 1 m ϶ ¯ i l x i ( s b l ( s ) ) + E i g ( x i ( s ) ) + F i w i ( s ) .
The measurement signal y i ( s ) from the ith node is given as follows:
y i ( s ) = C i x i ( s ) + D i v i ( s )
where y i ( s ) R l y is the measurement output of the ith ( i = 1 , 2 , , U ) node, C i and D i represent known matrices with rational dimensions, and v i ( s ) R l v is the measurement noise, which is a bounded stochastic noise sequence satisfying E v i ( s ) = 0 and V v i ( s ) = v 0 2 I ( l v ) , with v 0 being a positive scalar.

2.2. The Adoption of BESs

Considering its anti-interference features and the security of its digital communication, we chose to use the BESs during the network transmission of measurement signals y i ( s ) ( i = 1 , 2 , , U ) for CN (1). Suppose that the amplitude scope of a scalar signal y i ι ( s ) ( ι = 1 , 2 , , l y ) at instant s is [ τ , τ ] , where τ R > 0 is a given scalar. A binary encoder was adopted to encode the measurement signal into a BBS with length M. Specifically, a uniform quantizer was utilized to quantize the output signal y i ι ( s ) as y i ι ( s ) , which corresponds to a BBS [66]. The whole measurement signal scope was divided into 2 M portions with a uniform interval size ρ , defined as follows:
ρ = 2 τ 2 M .
Therefore, we obtained 2 M points (midpoint of every interval shown in Figure 1) defined by
O { ( 1 ) , ( 2 ) , , ( 2 M ) } ,
where these points are spaced uniformly and each point is expressed using the following form:
( ϵ ) τ + ( ϵ 1 2 ) ρ , ϵ = 1 , 2 , , 2 M .
The quantized signals were encoded by the encoder as BBSs and transferred through the BSC, and may flip randomly; they were described by a Bernoulli-distributed random variable with a probability q owing to the presence of channel noise [66]. The decoder recovered the received BBSs at the estimator side.
Lemma 1
([66]). Define ξ i ι ( s ) y i ι ( s ) y i ι ( s ) as the quantization error. ξ i ι ( s ) is an uniformly distributed stochastic variable in [ 0.5 ρ , 0.5 ρ ] satisfying
E ξ i ι ( s ) = 0 , V ξ i ι ( s ) = ρ 2 12 ξ 0 2 < ρ 2 4 = τ 2 2 2 M .
Lemma 2
([67]). Define y ˘ i ι ( s ) as the decoder output signal and h i ι ( s ) 1 1 2 q y ˘ i ι ( s ) y i ι ( s ) as the equivalent noise reflecting impact from bit errors. h i ι ( s ) has the following statistic property:
E h i ι ( s ) = 0 , V h i ι ( s ) h 0 2 = 4 q ( 1 q ) 2 2 M 1 τ 2 3 ( 1 2 q ) 2 2 M 1 2 .
In view of the aforementioned analysis, the signal used at the estimator is shown as follows:
y ˜ i ( s ) = y i ( s ) + ξ i ( s ) + h i ( s ) .
Remark 1.
The uniform quantization approach, unlike probabilistic quantization (a type of random quantization), is a deterministic one that divides the scope of the signal into equally spaced quantization intervals. Typically, the midpoint of each interval is chosen as the quantized discrete value. When the length of the BBS in both [66,67] is B, the quantization error of uniform quantization in [66] seems to be reduced compared to that of probabilistic quantization in [67], and the variance bound of the quantization error in [67] is bigger (i.e., τ 2 ( 2 M 1 ) 2 ) in comparison with that in [66].
Remark 2.
In (7), the description of the signal that is actually collected by the estimator is obtained via the measurement signal y i ( s ) , the quantization error ξ i ( s ) , and the equivalent noise-reflecting bit errors h i ( s ) ; this expression is beneficial to the establishment of the estimator model.
Remark 3.
The frequency of the occurrence of bit errors is measured using the bit error rate (BER), which is the percentage corresponding to the ratio of the number of flipping bits to the overall number of transferred binary bits. Here, we equate the probability of crossover to the BER. Note that bit errors may cause measurement deviations, reduce the realness and correctness of communication, and ultimately lead to a decrease in estimator performance.

2.3. The Model Establishment of Non-Fragile State Estimator

Based on the received signal y ˜ i ( s ) ( i = 1 , 2 , , U ) (7), a non-fragile state estimator was modelled for CN (1) as follows:
x ^ i ( s + 1 ) = A i x ^ i ( s ) + ζ = 1 p j = 1 U δ ( ϰ ( s ) , ζ ) a i j ( ζ ) Γ ( ζ ) x ^ j ( s ) + B b i l = 1 m ϶ ¯ i l x ^ i ( s b l ( s ) ) + E i g ( x ^ i ( s ) ) + S i ( ϰ ( s ) ) ( I ( l y ) + ( s ) ) ( y ˜ i ( s ) C i x ^ i ( s ) )
where x ^ i ( s ) R l x denotes the estimate of x i ( s ) , and S i ( ϰ ( s ) ) ( i = 1 , 2 , , U ) describes the unknown estimator gain, which is determined later.
In (8), the gain variation is considered and represented as ( s ) , which has the following specific form:
( s ) = m H ( s ) n
where m and n are given matrix parameters with rational dimensions, and H ( s ) is an uncertain matrix that satisfies H T ( s ) H ( s ) I ( l y ) .
Setting e i ( s ) x i ( s ) x ^ i ( s ) and g ¯ ( e i ( s ) ) g ( x i ( s ) ) g ( x ^ i ( s ) ) , the acquired estimation error is as follows:
e i ( s + 1 ) = ( A i S i ( ϰ ( s ) ) ( I ( l y ) + ( s ) C i ) e i ( s ) + ζ = 1 p j = 1 U δ ( ϰ ( s ) , ζ ) a i j ( ζ ) Γ ( ζ ) e j ( s ) + B b i l = 1 m ϶ ˜ i l ( s ) x i ( s b l ( s ) ) + B b i l = 1 m ϶ ¯ i l e i ( s b l ( s ) ) + E i g ¯ ( e i ( s ) ) + F i w i ( s ) S i ( ϰ ( s ) ) ( I ( l y ) + ( s ) ) D i v i ( s ) S i ( ϰ ( s ) ) ( I ( l y ) + ( s ) ) ξ i ( s ) S i ( ϰ ( s ) ) ( I ( l y ) + ( s ) ) h i ( s ) .
To simplify the expression, we present the following notations:
O diag { O 1 , O 2 , , O U } ( O = A , B b , C , E , D , F ) , S ( ϰ ( s ) ) diag { S 1 ( ϰ ( s ) ) , S 2 ( ϰ ( s ) ) , , S U ( ϰ ( s ) ) } , n ( s ) [ n 1 T ( s ) n 2 T ( s ) n U T ( s ) ] T ( n = x , e , w , v , ξ , h ) , g ( x ( s ) ) g T ( x 1 ( s ) ) g T ( x 2 ( s ) ) g T ( x U ( s ) ) T , g ˜ ( e ( s ) ) g ¯ T ( e 1 ( s ) ) g ¯ T ( e 2 ( s ) ) g ¯ T ( e U ( s ) ) T , Θ ˜ l ( s ) diag { ϶ ˜ 1 l ( s ) I ( l x ) , ϶ ˜ 2 l ( s ) I ( l x ) , , ϶ ˜ U l ( s ) I ( l x ) } , Θ ¯ l diag { ϶ ¯ 1 l I ( l x ) , ϶ ¯ 2 l I ( l x ) , , ϶ ¯ U l I ( l x ) } , x ( s b l ( s ) ) x 1 T ( s b l ( s ) ) x 2 T ( s b l ( s ) ) x U T ( s b l ( s ) ) T , e ( s b l ( s ) ) e 1 T ( s b l ( s ) ) e 2 T ( s b l ( s ) ) e U T ( s b l ( s ) ) T .
Compact forms of (4) and (10) are attained as follows:
x ( s + 1 ) = A x ( s ) + ζ = 1 p δ ( ϰ ( s ) , ζ ) Λ ( ζ ) Γ ( ζ ) x ( s ) + l = 1 m Θ ˜ l ( s ) B b x ( s b l ( s ) ) + l = 1 m Θ ¯ l B b x ( s b l ( s ) ) + E g ( x ( s ) ) + F w ( s )
and
e ( s + 1 ) = ζ = 1 p δ ( ϰ ( s ) , ζ ) Λ ( ζ ) Γ ( ζ ) + A S ( ϰ ( s ) ) I ( s ) C e ( s ) + l = 1 m Θ ˜ l ( s ) B b x ( s b l ( s ) ) + l = 1 m Θ ¯ l B b e ( s b l ( s ) ) + E g ˜ ( e ( s ) ) + F w ( s ) S ( ϰ ( s ) ) I ( s ) D v ( s ) S ( ϰ ( s ) ) I ( s ) ξ ( s ) S ( ϰ ( s ) ) I ( s ) h ( s )
where
I ( s ) I ( U l y ) + I ( U ) ( s ) .
Let η ( s ) x T ( s ) e T ( s ) T and g ˇ ( η ( s ) ) g T ( x ( s ) ) g ˜ T ( e ( s ) ) T . The following augmented SE error dynamics were derived with regard to (11)–(12):
η ( s + 1 ) = A ( ϰ ( s ) ) η ( s ) + l = 1 m Θ ˘ l ( s ) B b 1 η ( s b l ( s ) ) + l = 1 m Θ ˇ l B b 2 η ( s b l ( s ) ) + E g ˇ ( η ( s ) ) + F w ( s ) S ( ϰ ( s ) ) I ( s ) ( D v ( s ) + ξ ( s ) + h ( s ) )
where
A ( ϰ ( s ) ) diag { A + ζ = 1 p δ ( ϰ ( s ) , ζ ) Λ ( ζ ) Γ ( ζ ) , ζ = 1 p δ ( ϰ ( s ) , ζ ) Λ ( ζ ) Γ ( ζ ) + A S ( ϰ ( s ) ) × I ( s ) C } , B b 1 B b 0 ( ( U l x ) × ( U l x ) ) B b 0 ( ( U l x ) × ( U l x ) ) , B b 2 diag { B b , B b } , S ( ϰ ( s ) ) 0 ( ( U l x ) × ( U l y ) ) S ( ϰ ( s ) ) , E diag { E , E } , Θ ˘ l ( s ) diag { Θ ˜ l ( s ) , Θ ˜ l ( s ) } , Θ ˇ l diag { Θ ¯ l , Θ ¯ l } , F F F T .
Definition 1
([5]). If there exist scalars ϕ > 0 , 0 ψ < 1 and m > 0 which fulfill
E η ( s ) 2 ϕ ψ s sup b ¯ ȷ 0 E { η ( ȷ ) 2 } + m ,
then the state estimator (8) is called an exponentially ultimately bounded (EUB) estimator in the mean square for CN (1).
The goal of this paper is to design an EUB non-fragile state estimator (8) in mean square for CN (1). The SE issue discussed in this paper is shown in Figure 2.

3. Main Results

A few Lemmas are illustrated as follows; these were used for the performance analysis and estimator design (8).
Lemma 3
([68]). Considering a matrix P > 0 , and vectors L T and U T , the following inequality holds:
L T P U + U T P L L T P L + U T P U
holds.
Lemma 4
([5]). Constants 0 f 1 and γ are provided. If { J ( s ) | s = 0 , 1 , 2 , } is a nonnegative sequence with
J ( s + 1 ) f J ( s ) + γ ,
then,
J ( s ) J ( 0 ) + s γ for f = 1 , f s J ( 0 ) + γ ( 1 f s ) 1 f for f 1 .
Lemma 5
([64]). Let matrices X = X T , E and J be of suitable sizes, and F meets F F T I ; then, we can obtain that X + J F E + E T F T J T 0 is met if and only if there is a scalar ε > 0 satisfying X + ε 1 J J T + ε E T E < 0 or
X J T ε I ε E 0 ε I < 0 .
Now, we will analyze the estimator performance for CN (1).
Theorem 1.
Consider that the scalar 0 < κ < 1 and the gain parameter S i ( ϰ ( s ) ) ( i = 1 , 2 , , U , ϰ ( s ) ) are known. The estimator (8) becomes an EUB of CN (1) in mean square if matrices P a diag { P 1 a , P 2 a } > 0 ( P 1 a diag { P 11 a , P 12 a , , P 1 U a } , P 2 a diag { P 21 a , P 22 a , , P 2 U a } ) , Q v diag { Q 1 v , Q 2 v } > 0 ( Q 1 v diag { Q 11 v , Q 12 v , , Q 1 U v } , Q 2 v diag { Q 21 v , Q 22 v , , Q 2 U v } ) ( v = 1 , 2 , , m ), and scalars λ a > 0 satisfy the following inequality:
Ψ a = Ψ 11 a Ψ 12 a Ψ 13 a Ψ 22 a Ψ 23 a Ψ 33 a < 0
where
Ψ 11 a A T P ¯ a A λ a Ξ ˜ 1 + ( 1 + b ¯ b ̲ ) v = 1 m Q v P a , Ψ 12 a A T P ¯ a ( Θ ˇ B b 2 ) , P ¯ a b = 1 p π a b P b , Ψ 13 a A T P ¯ a E + λ a Ξ ˜ 2 T , Ξ ˜ 1 I ( 2 U ) Ξ ¯ 1 , Ξ ˜ 2 I ( 2 U ) Ξ ¯ 2 , Ψ 22 a ( I ( m ) B b 1 ) T Θ ^ T ( I ( m ) P ¯ a ) Θ ^ ( I ( m ) B b 1 ) + ( Θ ˇ B b 2 ) T P a ¯ ( Θ ˇ B b 2 ) ( 1 κ ) b ¯ Q ¯ , Ψ 23 a ( Θ ˇ B b 2 ) T P ¯ a E , Ψ 33 a E T P ¯ a E λ a I ( 2 U l x ) , Θ ˇ Θ ˇ 1 Θ ˇ 2 Θ ˇ m , Ξ ¯ 1 Ξ 1 T Ξ 2 + Ξ 2 T Ξ 1 2 , Ξ ¯ 2 Ξ 1 + Ξ 2 2 , Q ¯ diag { Q 1 , Q 2 , , Q m } , Θ ^ l diag ϶ ¯ 1 l ( 1 ϶ ¯ 1 l ) I ( l x ) , ϶ ¯ 2 l ( 1 ϶ ¯ 2 l ) I ( l x ) , , ϶ ¯ U l ( 1 ϶ ¯ U l ) I ( l x ) , Θ ^ diag { I ( 2 ) Θ ^ 1 , I ( 2 ) Θ ^ 2 , , I ( 2 ) Θ ^ m } .
Proof of Theorem 1.
The Lyapunov functional is defined as follows:
V s , η ( s ) , ϰ ( s ) r = 1 3 V r s , η ( s ) , ϰ ( s )
where
V 1 ( s , η ( s ) , ϰ ( s ) ) η T ( s ) P ( ϰ ( s ) ) η ( s ) , V 2 ( s , η ( s ) ) v = 1 m u = s b v ( s ) s 1 ( 1 κ ) s u 1 η T ( u ) Q v η ( u ) , V 3 ( s , η ( s ) ) v = 1 m n = s b ¯ + 1 s b ̲ u = n s 1 ( 1 κ ) s u 1 η T ( u ) Q v η ( u ) .
Letting P a P ϰ ( s ) = a ( a ), and noticing that E { Θ ˘ l ( s ) } = 0 , E { w ( s ) } = 0 , E { v ( s ) } = 0 , E { ξ ( s ) } = 0 and E { h ( s ) } = 0 , one can observe from (13) that
E Δ V 1 ( s , η ( s ) , ϰ ( s ) ) = E V 1 s + 1 , η ( s + 1 ) , ϰ ( s + 1 ) | η ( s ) , ϰ ( s ) = a V 1 ( s , η ( s ) , a ) = E { η T ( s ) A T P ¯ a A η ( s ) η T ( s ) P a η ( s ) + 2 η T ( s ) A T P ¯ a E g ˇ ( η ( s ) ) + 2 η T ( s ) A T P ¯ a ( Θ ˇ B b 2 ) × η ( s b ( s ) ) + g ˇ T ( η ( s ) ) E T P ¯ a E g ˇ ( η ( s ) ) + w T ( s ) F T P ¯ a F w ( s ) + η T ( s b ( s ) ) ( I ( m ) B b 1 ) T × Θ ^ T ( I ( m ) P ¯ a ) Θ ^ ( I ( m ) B b 1 ) η ( s b ( s ) ) + η T ( s b ( s ) ) ( Θ ˇ B b 2 ) T P ¯ a ( Θ ˇ B b 2 ) × η ( s b ( s ) ) + 2 η T ( s b ( s ) ) ( Θ ˇ B b 2 ) T P ¯ a E g ˇ ( η ( s ) ) + v T ( s ) D T I T ( s ) S a T P ¯ a S a I ( s ) × D v ( s ) + ξ T ( s ) I T ( s ) S a T P ¯ a S a I ( s ) ξ ( s ) + h T ( s ) I T ( s ) S a T P ¯ a S a I ( s ) h ( s ) + 2 v T ( s ) D T I T ( s ) S a T P ¯ a S a I ( s ) ξ ( s ) + 2 v T ( s ) D T I T ( s ) S a T P ¯ a S a I ( s ) h ( s ) + 2 ξ T ( s ) I T ( s ) S a T P ¯ a S a I ( s ) h ( s ) } .
Using Lemma 3, we can obtain the following inequalities:
2 v T ( s ) D T I T ( s ) S a T P ¯ a S a I ( s ) ξ ( s )
v T ( s ) D T I T ( s ) S a T P ¯ a S a I ( s ) D v ( s ) + ξ T ( s ) I T ( s ) S a T P ¯ a S a I ( s ) ξ ( s ) , 2 v T ( s ) D T I T ( s ) S a T P ¯ a S a I ( s ) h ( s )
v T ( s ) D T I T ( s ) S a T P ¯ a S a I ( s ) D v ( s ) + h T ( s ) I T ( s ) S a T P ¯ a S a I ( s ) h ( s ) , 2 ξ T ( s ) I T ( s ) S a T P ¯ a S a I ( s ) h ( s )
ξ T ( s ) I T ( s ) S a T P ¯ a S a I ( s ) ξ ( s ) + h T ( s ) I T ( s ) S a T P ¯ a S a I ( s ) h ( s )
By utilizing the property F = F (where F and are two diagonal matrices), and the characteristic of matrix trace ( tr { W Y } = tr { Y W } , tr { c } = c (where c R is a constant) and tr { diag { W , Y } } = tr { W } + tr { Y } ), and combining this with (17)–(19), we obtain the following:
E Δ V 1 ( s , η ( s ) , ϰ ( s ) ) E { η T ( s ) A T P ¯ a A η ( s ) η T ( s ) P a η ( s ) + 2 η T ( s ) A T P ¯ a E g ˇ ( η ( s ) ) + 2 η T ( s ) A T P ¯ a ( Θ ˇ B b 2 ) × η ( s b ( s ) ) + g ˇ T ( η ( s ) ) E T P ¯ a E g ˇ ( η ( s ) ) + η T ( s b ( s ) ) ( I ( m ) B b 1 ) T Θ ^ T ( I ( m ) P ¯ a ) Θ ^ × ( I ( m ) B b 1 ) η ( s b ( s ) ) + η T ( s b ( s ) ) ( Θ ˇ B b 2 ) T P ¯ a ( Θ ˇ B b 2 ) η ( s b ( s ) ) + 2 η T ( s b ( s ) ) ( Θ ˇ B b 2 ) T P ¯ a E g ˇ ( η ( s ) ) + tr { F T P ¯ a F w ( s ) w T ( s ) } + tr { 3 D T I T ( s ) S a T P ¯ a S a I ( s ) D v ( s ) v T ( s ) } + tr { 3 I T ( s ) S a T P ¯ a S a I ( s ) ξ ( s ) ξ T ( s ) + 3 I T ( s ) S a T P ¯ a S a I ( s ) h ( s ) h T ( s ) } }
where
η ( s b ( s ) ) η T ( s b 1 ( s ) ) η T ( s b 2 ( s ) ) η T ( s b m ( s ) ) T ,
E Δ V 2 ( s , η ( s ) ) = E v = 1 m u = s b v ( s + 1 ) + 1 s ( 1 κ ) s u η T ( u ) Q v η ( u ) v = 1 m u = s b v ( s ) s 1 ( 1 κ ) s u 1 η T ( u ) Q v η ( u ) = v = 1 m { η T ( s ) Q v η ( s ) + u = s b v ( s + 1 ) + 1 s 1 ( 1 κ ) s u η T ( u ) Q v η ( u ) u = s b v ( s ) s 1 ( 1 κ ) s u 1 η T ( u ) Q v η ( u ) } v = 1 m { η T ( s ) Q v η ( s ) + u = s b ¯ + 1 s b ̲ ( 1 κ ) s u η T ( u ) Q v η ( u ) + u = s b v ( s ) + 1 s 1 ( 1 κ ) s u η T ( u ) × Q v η ( u ) u = s b v ( s ) s 1 ( 1 κ ) s u 1 η T ( u ) Q v η ( u ) } = v = 1 m { η T ( s ) Q v η ( s ) + u = s b ¯ + 1 s b ̲ ( 1 κ ) s u η T ( u ) Q v η ( u ) + u = s b v ( s ) s 1 ( 1 κ ) s u η T ( u ) Q v × η ( u ) ( 1 κ ) b v ( s ) η T ( s b v ( s ) ) Q v η ( s b v ( s ) ) u = s b v ( s ) s 1 ( 1 κ ) s u 1 η T ( u ) Q v η ( u ) } v = 1 m { η T ( s ) Q v η ( s ) + u = s b ¯ + 1 s b ̲ ( 1 κ ) s u η T ( u ) Q v η ( u ) ( 1 κ ) b ¯ η T ( s b v ( s ) ) Q v × η ( s b v ( s ) ) κ u = s b v ( s ) s 1 ( 1 κ ) s u 1 η T ( u ) Q v η ( u ) } = v = 1 m { η T ( s ) Q v η ( s ) + u = s b ¯ + 1 s b ̲ ( 1 κ ) s u η T ( u ) Q v η ( u ) ( 1 κ ) b ¯ η T ( s b v ( s ) ) Q v × η ( s b v ( s ) ) } κ V 2 ( s , η ( s ) )
and
E Δ V 3 ( s , η ( s ) ) = E { v = 1 m n = s b ¯ + 2 s + 1 b ̲ u = n s ( 1 κ ) s u η T ( u ) Q v η ( u ) v = 1 m n = s b ¯ + 1 s b ̲ u = n s 1 ( 1 κ ) s u 1 × η T ( u ) Q v η ( u ) } = v = 1 m { ( b ¯ b ̲ ) η T ( s ) Q v η ( s ) + n = s b ¯ + 2 s + 1 b ̲ u = n s 1 ( 1 κ ) s u η T ( u ) Q v η ( u ) n = s b ¯ + 1 s b ̲ u = n s 1 ( 1 κ ) s u 1 η T ( u ) Q v η ( u ) } = v = 1 m { ( b ¯ b ̲ ) η T ( s ) Q v η ( s ) + n = s b ¯ + 1 s b ̲ u = n + 1 s 1 ( 1 κ ) s u η T ( u ) Q v η ( u ) n = s b ¯ + 1 s b ̲ u = n s 1 ( 1 κ ) s u 1 η T ( u ) Q v η ( u ) } = v = 1 m { ( b ¯ b ̲ ) η T ( s ) Q v η ( s ) u = s b ¯ + 1 s b ̲ ( 1 κ ) s u η T ( u ) Q v η ( u ) + n = s b ¯ + 1 s b ̲ u = n s 1 ( 1 κ ) s u × η T ( u ) Q v η ( u ) n = s b ¯ + 1 s b ̲ u = n s 1 ( 1 κ ) s u 1 η T ( u ) Q v η ( u ) } = v = 1 m { ( b ¯ b ̲ ) η T ( s ) Q v η ( s ) u = s b ¯ + 1 s b ̲ ( 1 κ ) s u η T ( u ) Q v η ( u ) κ n = s b ¯ + 1 s b ̲ u = n s 1 ( 1 κ ) s u 1 η T ( u ) Q v η ( u ) } = v = 1 m ( b ¯ b ̲ ) η T ( s ) Q v η ( s ) u = s b ¯ + 1 s b ̲ ( 1 κ ) s u η T ( u ) Q v η ( u ) κ V 3 ( s , η ( s ) ) .
Based on (3), we know that
x i ( s ) g ( x i ( s ) ) T Ξ ¯ 1 Ξ ¯ 2 T I ( l x ) x i ( s ) g ( x i ( s ) ) 0 ,
e i ( s ) g ¯ ( e i ( s ) ) T Ξ ¯ 1 Ξ ¯ 2 T I ( l x ) e i ( s ) g ¯ ( e i ( s ) ) 0 .
The compact forms of (23) and (24) can be acquired as follows:
η ( s ) g ˇ ( η ( s ) ) T Ξ ˜ 1 Ξ ˜ 2 T I ( 2 U l x ) η ( s ) g ˇ ( η ( s ) ) 0 .
To summarize the above discussions, the following inequality is obtained:
E Δ V ( s , η ( s ) , a ) ζ T ( s ) Ψ a ζ ( s ) κ V ( s , η ( s ) , a ) + tr { Φ a }
where
ζ ( s ) η T ( s ) η T ( s b ( s ) ) g ˇ T ( η ( s ) ) T , Φ a diag { w 0 2 F T P ¯ a F , 3 v 0 2 D T I T ( s ) S a T P ¯ a S a I ( s ) D , 3 ξ 0 2 I T ( s ) S a T P ¯ a S a I ( s ) + 3 h 0 2 I T ( s ) S a T P ¯ a S a I ( s ) } .
Considering (15), we can obtain from (26) that
E V ( s + 1 , η ( s + 1 ) , ϰ ( s + 1 ) ) | η ( s ) , ϰ ( s ) = a ( 1 κ ) E { V ( s , η ( s ) , a ) } + tr ( Φ a ) .
By utilizing Lemma 4, the following is obtained:
E V ( s , η ( s ) , a ) ( 1 κ ) s E { V ( 0 , η ( 0 ) , a ) } + ( 1 ( 1 κ ) s ) tr ( Φ a ) κ .
Using (16), it can be observed that
E V ( s , η ( s ) , a ) φ min ( P a ) E η ( s ) 2
and
E V ( 0 , η ( 0 ) , a ) ϕ ¯ sup b ¯ ȷ 0 E { η ( ȷ ) 2 }
where
ϕ ¯ φ max ( P a ) + ( b ¯ 2 b ¯ b ̲ + b ̲ ) v = 1 m φ max ( Q v )
Accordingly, an inequality is obtained from (28)–(30) as follows:
E η ( s ) 2 ( 1 κ ) s E V ( 0 , η ( 0 ) , a ) φ min ( P a ) + tr ( Φ ) κ φ min ( P a ) ϕ ¯ φ min ( P a ) ( 1 κ ) s sup b ¯ ȷ 0 E { η ( ȷ ) 2 } + tr ( Φ ) κ φ min ( P a ) .
In terms of Definition 1, it can be observed that the dynamics of the estimation error are EUB in mean square, and the ultimate error bound is shown as follows:
tr ( Φ ) κ φ min ( P a ) .
The SE error can be expressed using e ( s ) W η ( s ) with W 0 ( ( U l x ) × ( U l x ) ) I ( U l x ) . In the upcoming section, we aimed to design a gain parameter for a non-fragile estimator (8). □
Theorem 2.
Consider that scalar 0 < κ < 1 is known. The constructed estimator (8) becomes an EUB state estimator of CN (1) in mean square as long as matrices P a diag { P 1 a , P 2 a } > 0 ( P 1 a diag { P 11 a , P 12 a , , P 1 U a } , P 2 a diag { P 21 a , P 22 a , , P 2 U a } ) , Q v diag { Q 1 v , Q 2 v } > 0 ( Q 1 v diag { Q 11 v , Q 12 v , , Q 1 U v } , Q 2 v diag { Q 21 v , Q 22 v , , Q 2 U v } , v = 1 , , m ) , R > 0 ( R = diag { R 1 , R 2 , R 3 } ), a matrix G a 0 ( ( U l y ) × ( U l x ) ) G 2 a T T ( G 2 a diag { G 21 a , G 22 a , , G 2 U a } ) , and scalars λ a > 0 , ε a > 0 , and ϱ a > 0 satisfy the following linear matrix inequalities:
Υ 11 a 0 Υ 22 Υ 31 a 0 Υ 33 a Υ 41 a Υ 42 a P ¯ a E P ¯ a 0 0 Υ 52 a 0 0 I ( m ) P ¯ a 0 0 0 Υ 64 a 0 ε a I ( 2 U l y ) Υ 71 a 0 0 0 0 0 ε a I ( 2 U l y ) < 0 ,
R K a I ( 4 ) P ¯ a 0 m ^ a T ϱ a I ( 2 U l y ) ϱ a n ^ 0 0 ϱ a I ( 2 U l y ) < 0 ,
W T W < P a
where
Υ 11 a λ a Ξ ˜ 1 + ( 1 + b ¯ b ̲ ) v = 1 m Q v P a , Υ 22 ( 1 κ ) b ¯ Q ¯ , Υ 33 a λ a I ( 2 U l x ) , Υ 41 a P ¯ a A ¯ a + G a C ¯ 1 , Υ 42 a P ¯ a ( Θ ˇ B b 2 ) , Υ 52 a ( I ( m ) P ¯ a ) Θ ^ ( I ( m ) B b 1 ) , Υ 31 a λ a Ξ ˜ 2 , Υ 64 a m ¯ T G a T , Υ 71 a diag { 0 ( ( U l y ) × ( U l x ) ) , ε a ( I ( U ) n ) C } , C ¯ 1 0 ( ( U l y ) × ( U l x ) ) C , A ¯ a diag A + Λ ( a ) Γ ( a ) , A + Λ ( a ) Γ ( a ) , m ¯ 0 ( ( U l y ) × ( U l y ) ) I ( U ) m , K a w 0 P ¯ a F 0 0 0 3 v 0 G a D 0 0 0 3 ξ 0 G a 0 0 3 h 0 G a , n ^ 0 ( I ( U ) n ) D 0 0 0 I ( U ) n , m ^ a 0 0 3 v 0 G a ( I ( U ) m ) 0 0 3 ξ 0 G a ( I ( U ) m ) 0 3 h 0 G a ( I ( U ) m ) .
Additionally, the minimum ultimate bound of estimation error E e ( s ) 2 is attained via settling the following optimization issue:
min subject   to   ( 31 ) ( 33 ) tr ( R ) .
The gain expression for the state estimator (8) is presented as follows:
S i a P ¯ 2 i a 1 G 2 i a .
Proof of Theorem 2.
Defining P ¯ a S a G a and P ¯ 2 i a S i a G 2 i a , through the application of Schur Complement Lemma and Lemma 5, (15) holds as long as (31) holds.
Considering Φ a = K ^ a T ( I ( 4 ) P ¯ a ) 1 K ^ a with
K ^ a w 0 P ¯ a F 0 0 0 3 v 0 P ¯ a S a I ( s ) D 0 0 0 3 ξ 0 P ¯ a S a I ( s ) 0 0 3 h 0 P ¯ a S a I ( s ) ,
we can obtain from (32) that
Φ a < R .
By combining (28) with (36), we can derive the following:
E V ( s , η ( s ) , a ) < ( 1 κ ) s E { V ( 0 , η ( 0 ) , a ) }   +   tr ( Φ a ) κ < ( 1 κ ) s E { V ( 0 , η ( 0 ) , a ) }   +   tr ( R ) κ .
Based on (33) and (30), we can derive the following:
E e ( s ) 2 = E η T ( s ) W T W η ( s ) < E η T ( s ) P a η ( s ) < E V ( s , η ( s ) , a ) < ( 1 κ ) s E V ( 0 , η ( 0 ) , a ) + tr ( R ) κ < ϕ ¯ ( 1 κ ) s sup b ¯ ȷ 0 E { η ( ȷ ) 2 }   +   tr ( R ) κ .
By considering (38), tr ( R ) κ is the ultimate bound of E e ( s ) 2 . Through minimizing tr ( R ) , the minimum of such an ultimate bound is attained, which ends the proof. □
Note that the result yielded in Theorem 2 can be generalized to more ordinary situations, e.g., the SE of CNs with a constant time delay. Change l = 1 m ϶ i l ( s ) x i ( s b l ( s ) ) to x i ( s b ) with a given scalar b > 0 . The following corollary was obtained from Theorem 2, which was used to design a state estimator that satisfies the exponential ultimate boundedness in mean square for CN (1) with a constant time delay.
Corollary 1.
Let scalar 0 < κ < 1 be known. The constructed estimator (8) becomes an EUB state estimator of CN (1) in mean square as long as matrices P a diag { P 1 a , P 2 a } > 0 ( P 1 a diag { P 11 a , P 12 a , , P 1 U a }, P 2 a diag { P 21 a , P 22 a , , P 2 U a } ) , Q diag { Q 1 , Q 2 } > 0   ( Q 1 diag { Q 11 , Q 12 , , Q 1 U } , Q 2 diag { Q 21 , Q 22 , , Q 2 U } ) , R > 0 ( R = diag { R 1 , R 2 , R 3 } ), a matrix G a 0 ( ( U l y ) × ( U l x ) ) G 2 a T T ( G 2 a diag { G 21 a , G 22 a , , G 2 U a } ) , and scalars λ a > 0 , ε a > 0 , and ϱ a > 0 satisfy (32), (33) and the following linear matrix inequality:
Υ ¯ 11 a 0 Υ ¯ 22 Υ 31 a 0 Υ 33 a Υ 41 a Υ ¯ 42 a P ¯ a E P ¯ a 0 0 0 Υ 64 a ε a I ( 2 U l y ) Υ 71 a 0 0 0 0 ε a I ( 2 U l y ) < 0
where
Υ ¯ 11 a λ Ξ ˜ 1 + Q P a , Υ ¯ 22 Q , Υ ¯ 42 a P ¯ a B b 2 .
Additionally, the minimum value of the ultimate bound of E e ( s ) 2 was determined via tackling the following optimization issue:
min subject to ( 32 ) , ( 33 ) and ( 39 ) tr ( R ) .
The gain parameter is represented as (35) of the non-fragile estimator (8).
Remark 4.
In this paper, the issue of non-fragile SE is discussed, focusing on nonlinear delayed CNs subject to random couplings using BESs. The major advantages presented by this paper compared to existing SE approaches for CNs are as follows: (1) the issue of non-fragile SE is considered for the first time for nonlinear CNs with multiple stochastic communication time delays and random couplings under BESs; (2) the impact of the phenomenon of random bit errors considered regarding the capability of the state estimator; and (3) the proposed SE approach ensures that the SE error dynamics are EUB in mean square and the minimum ultimate bound is obtained.
In the subsequent section, two confirmatory examples are used to verify the rationality and effectiveness of the obtained SE method.

4. Simulation Examples

Example 1.
Consider a CN (1) ( U = 5 ) with the following parameters:
p = 2 , M = 6 , q = 0.01 , ρ = 0.0355 , w 0 = 0.02 , v 0 = 0.04 , m = 2 , b ¯ = 4 , b ̲ = 1 , ϶ ¯ 11 = ϶ ¯ 21 = ϶ ¯ 31 = ϶ ¯ 41 = ϶ ¯ 51 = 0.8 , ϶ ¯ 12 = ϶ ¯ 22 = ϶ ¯ 32 = ϶ ¯ 42 = ϶ ¯ 52 = 0.6 , ρ = 0.0355 , π 11 = 0.55 , π 12 = 0.45 , π 21 = 0.4 , π 22 = 0.6 , D 1 = D 2 = 0.03 , D 3 = D 4 = 0.02 , Γ ( 1 ) = diag { 0.52 , 0.53 , 0.52 } , Γ ( 2 ) = diag { 0.64 , 0.63 , 0.65 } , m = 1 , n = 0.3 , D 5 = 0.01 , Λ ( 1 ) = 0.4 0.15 0.08 0.12 0.05 0.15 0.4 0.1 0.07 0.08 0.08 0.1 0.3 0.04 0.08 0.12 0.07 0.04 0.3 0.07 0.05 0.08 0.08 0.07 0.28 , Λ ( 2 ) = 0.2 0.05 0.05 0.05 0.05 0.05 0.2 0.05 0.05 0.05 0.05 0.05 0.2 0.05 0.05 0.05 0.05 0.05 0.2 0.05 0.05 0.05 0.05 0.05 0.2 , A 1 = A 2 = 0.01 0 0.009 0 0.001 0.022 0.011 0.012 0.018 , A 3 = A 4 = 0.02 0.02 0.01 0.01 0.03 0.01 0.03 0.02 0.01 , κ = 0.01 , A 5 = 0.02 0.01 0.02 0.01 0.02 0.03 0.01 0.04 0.02 , B b 1 = B b 2 = 0.02 0.03 0.01 0.04 0.01 0.02 0.02 0.01 0.03 , B b 3 = B b 4 = 0.04 0.01 0.03 0.02 0.02 0.02 0.01 0.02 0.02 , B b 5 = 0.02 0.01 0.02 0.02 0.03 0.02 0.02 0.02 0.04 , C 1 = C 2 = 0.1 0.2 0.1 , C 3 = C 4 = 0.1 0.2 0.1 , C 5 = 0.1 0.2 0.1 , E 1 = E 2 = E 3 = E 4 = E 5 = 1 1 1 1 1 1 1 1 1 , F 1 = F 2 = 0.01 0.01 0 , F 3 = F 4 = 0.01 0.01 0.01 , F 5 = 0.02 0.01 0.02 .
The nonlinear function g ( x i ( s ) ) ( i = 1 , 2 , , U ) is chosen as follows:
g ( x i ( s ) ) = 0.06 x i 1 ( s ) + 0.03 x i 2 ( s ) + tanh ( 0.03 x i 1 ( s ) ) 0.06 x i 2 ( s ) tanh ( 0.02 x i 2 ( s ) ) 0.06 x i 2 ( s ) + 0.03 x i 3 ( s ) + tanh ( 0.03 x i 2 ( s ) )
where x i σ ( s ) ( σ = 1 , 2 , 3 ) is the σ th element of x i ( s ) . It can be observed that (3) is fulfilled as follows:
Ξ 1 = 0.06 0.03 0 0 0.04 0 0 0.06 0.03 and Ξ 2 = 0.03 0.03 0 0 0.06 0 0 0.03 0.03 .
By solving the optimization issue (34) subject to matrix inequalities (31)–(33), the gain parameters of the estimator (8) are calculated as follows:
S 11 = 10 14 × 0.1015 0.0261 0.2212 , S 21 = 10 15 × 0.2787 0.4131 0.2407 , S 31 = 10 16 × 0.7013 0.7124 0.0248 , S 41 = 10 17 × 0.2144 0.2898 0.1688 , S 51 = 10 17 × 0.0952 0.1899 0.0227 , S 12 = 10 15 × 0.1812 0.0621 0.1680 , S 22 = 10 18 × 0.6679 0.8591 0.7532 , S 32 = 10 18 × 0.2586 0.4815 0.4934 , S 42 = 10 16 × 0.0004 0.0001 0.1626 , S 52 = 10 13 × 0.0879 0.5279 0.1690 .
Select the initial conditions x i ( ς ) = 0.9 0.2 0.6 T and x ^ i ( ς ) = 0 0 0 T ( ς = 4 , 3 , , 0 , i = 1 , 2 , , 5 ) . Select H ( s ) = cos ( 3 s + 1 ) and b 1 ( s ) = b 2 ( s ) = 3 + ( 1 ) s . The simulation figures are presented in Figure 3, Figure 4, Figure 5, Figure 6 and Figure 7. Figure 3 shows the current mode describing randomly varying couplings, where “1” and “2” in the vertical coordinate represent the first and second mode of couplings, respectively. In Figure 4, the estimation error is represented by five nodes. Figure 4 shows that the estimation error for each node is low and gradually approximates to 0, which illustrates that the SE is exact. The original measurement signal and the one received by the estimator are plotted in Figure 5, and the deviation between them indicates the existence of random bit errors. Figure 6 depicts the norm of the estimation error (i.e., e ( s ) 2 ). From Figure 6, we see that e ( s ) 2 is bounded; that is, the estimator performance requirement (14) of exponential ultimate boundedness in mean square is fulfilled for CN (1). In Figure 7, the occurrence of random bit errors is revealed. For node 2, bit flipping occurs in the second bit and the first bit at time steps 8 and 17, respectively, which causes signal distortion at the same time steps in Figure 5. Furthermore, the higher bit undergoes bit flipping, and a larger deviation appears between the original measurement outputs and the received ones. In summary, the estimation results obtained by the designed non-fragile estimator are good.
Example 2.
For a delayed complex network (1) ( U = 4 ) whose local dynamical system ( l x = 3 ) is a discrete-time Chua’s circuit (as is depicted in Figure 8), x 1 ( s ) , x 2 ( s ) and x 3 ( s ) denote voltages v C 1 and v C 2 across the linear capacitors with capacitances C 1 and C 2 , and the current i L passing the linear inductor L, respectively; and the nonlinear function g ( · ) describes voltage versus the current feature of the nonlinear resistor N R (Chua’s diode) [5,69].
The parameters of such a complex network are presented as follows:
κ = 0.01 , π 11 = 0.65 , π 12 = 0.35 , π 21 = 0.5 , π 22 = 0.5 , w 0 = 0.02 , v 0 = 0.04 , m = 2 , Λ ( 1 ) = 0.4 0.15 0.15 0.1 0.2 0.6 0.2 0.2 0.15 0.15 0.5 0.2 0.2 0.2 0.2 0.6 , Λ ( 2 ) = 0.64 0.22 0.22 0.2 0.22 0.58 0.12 0.24 0.22 0.12 0.44 0.1 0.2 0.24 0.1 0.54 , A 1 = 0.6 0.4 0 0.3 0.7 0.2 0 5.4 0.8 , A 2 = A 1 , A 3 = 0.8 0.2 0 0.25 0.75 0.1 0 0.2 0.9 , A 4 = A 3 , B b 1 = B b 2 = B b 3 = B b 4 = 0.01 I ( 3 ) , ρ = 0.0355 , ϶ ¯ 11 = ϶ ¯ 21 = ϶ ¯ 31 = ϶ ¯ 41 = 0.4 , Γ ( 1 ) = I ( 3 ) , Γ ( 2 ) = 0.5 I ( 3 ) , q = 0.01 , m = I ( 2 ) , ϶ ¯ 12 = ϶ ¯ 22 = ϶ ¯ 32 = ϶ ¯ 42 = 0.5 , M = 6 , C 1 = C 2 = C 3 = C 4 = 1 0 0 0 1 0 , D 1 = 0.003 0.003 , D 3 = 0.002 0.002 , n = 0.01 0.01 0.01 0.01 , D 2 = D 1 , D 4 = D 3 , E 1 = E 2 = E 3 = E 4 = I ( 3 ) , F 1 = F 2 = F 3 = F 4 = I ( 3 ) , b ̲ = 1 , b ¯ = 4 .
The expression of nonlinear function g ( x i ( s ) ) ( i = 1 , 2 , , 4 ) is
g ( x i ( s ) ) = 0.2 x i 1 ( s ) + 0.3 ( | x i 1 ( s ) + 2 | | x i 1 ( s ) 2 | ) 0 0 ,
and it was observed that Ξ 1 = diag { 0.8 , 0 , 0 } and Ξ 2 = diag { 0.2 , 0 , 0 } satisfy (3).
By solving the optimization issue (34), the gain parameters of estimator (8) are computed as follows:
S 11 = 10 7 × 0.0098 0.0376 0.0292 0.1120 0.0125 0.0480 , S 21 = 10 8 × 0.0064 0.0365 0.0182 0.1017 0.0032 0.0254 , S 31 = 10 12 × 0.1480 0.2986 0.1049 0.2305 0.0446 0.0712 , S 41 = 10 12 × 0.0064 0.0917 0.1303 0.1586 0.0650 0.0492 , S 12 = 10 9 × 0.9808 0.2382 0.0243 0.0038 0.0124 0.0011 , S 22 = 10 12 × 0.3878 0.6634 0.2159 0.5081 0.2846 0.7688 , S 32 = 10 12 × 0.4269 0.0116 0.0791 0.0603 0.2546 0.0351 , S 42 = 10 9 × 0.0189 0.0205 0.1827 0.1960 0.0793 0.0852 .
The initial states are given as x i ( 4 ) = 0.9 0.2 0.6 T , x i ( 3 ) = 0.8 0.4 0.2 T , x i ( 2 ) = 0.2 0.7 0.7 T , x i ( 1 ) = 0.3 0.4 0.2 T , x i ( 0 ) = 0.4 0.2 0.1 T , x ^ i ( 4 ) = 0.3 0.4 0.1 T , x ^ i ( 3 ) = 0.5 0.4 0.2 T , x ^ i ( 2 ) = 0.1 0.6 0.5 T , x ^ i ( 1 ) = 0.3 0.3 0.3 T and x ^ i ( 0 ) = 0.4 0.5 0.2 T ( i = 1 , 2 , , 4 ). H ( s ) = 0.01 cos ( 3 s + 1 ) I ( 2 ) and b 1 ( s ) = b 2 ( s ) = 3 + ( 1 ) s are chosen. Simulation curves are presented in Figure 9, Figure 10, Figure 11, Figure 12 and Figure 13. In Figure 9, the situation of mode switching is exhibited for the Markov chain, where “1” (or “2”) in the vertical coordinate indicates that coupling occurred with mode 1 (or mode 2). In Figure 10, the SE error e i ( s ) ( i = 1 , 2 , , 4 ) is presented, which is within the interval [ 2.645 , 3.012 ] . In Figure 11, the ideal measurement signal and the actually received one are shown, and there is a difference between them. When an accurate description of the received measurement signal is provided, instead of using the ideal measurement signal, the estimation performance is guaranteed. In Figure 12, the norm of the SE error e ( s ) is presented, which is bounded (not more than 11.92 ). In Figure 13, for the BBS from measurement y i ( i = 1 , 2 , , 4 , = 1 , 2 ), bits that undergo flipping are presented. For the measurement component y 11 ( s ) , bit flipping occurred in bits 5, 2, 6, 4, 6 and 2 at time steps 19, 22, 41, 45, 46 and 54, respectively. In light of the aforementioned outcomes, the developed non-fragile SE means presented in this paper are valid.

5. Conclusions

The issue of non-fragile SE was investigated in this paper for a type of nonlinear delayed CN with randomly varying couplings under BESs. A Markov chain was used to reflect the stochastic variations in both the network topology and the inner coupling, in combination with the Kronecker delta function. The BESs were applied to the signal transmission between the sensor and the remote state estimator. The phenomenon of random bit errors was considered and described using a sequence of Bernoulli-distributed random variables. Considering the gain perturbations that occurred during the practical execution of the estimator, the non-fragile state estimator was modelled under different gain variations, which ensured that the SE error dynamics were EUB in mean square and the ultimate bound was minimized. The gain parameter of the established estimator was obtained by tackling the optimization problem constrained by some linear matrix inequalities. The working ability of the designed estimator was demonstrated through two expository examples. In future, we would extend the acquired result to the SE of (1) CNs using the available measurement outputs from only a portion of the network nodes [70,71]; (2) sensor networks [72,73]; and (3) other systems [74,75].

Author Contributions

Conceptualization, Y.S.; methodology, M.C.; software, X.B.; validation, W.L. and X.B.; formal analysis, M.C.; investigation, Y.S.; resources, X.B.; writing—original draft preparation, W.L.; writing—review and editing, N.H.; visualization, W.L.; supervision, N.H.; project administration, Y.S.; funding acquisition, X.B. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded in part by the Hainan Provincial Joint Project of Sanya Yazhou Bay Science and Technology City of China grant number 2021JJLH0025; in part by the National Natural Science Foundation of China grant numbers U21A2019, 62203105 and 62403120; and in part by the Natural Science Foundation of Heilongjiang Province of China grant number YQ2023F003.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Conflicts of Interest

Author Weijian Li was employed by the Sinopec Qilu Petrochemical Company. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
CNsComplex networks.
SEState estimation.
NCSsNetworked control systems.
BESBinary encoding scheme.
BBSBinary bit string.
BSCBinary symmetric channel.
BERBit error rate.
EUBExponentially ultimately bounded.

References

  1. Mei, Z.; Oguchi, T. A real-time identification method of network structure in complex network systems. Int. J. Syst. Sci. 2023, 54, 549–564. [Google Scholar] [CrossRef]
  2. Shen, Y.; Wang, Z.; Dong, H.; Liu, H.; Chen, Y. Set-membership state estimation for multirate nonlinear complex networks under FlexRay protocols: A neural-network-based approach. IEEE Trans. Neural Netw. Learn. Syst. 2025, 36, 4922–4933. [Google Scholar] [CrossRef]
  3. Shang, R.; Dong, H.; Wang, C.; Chen, S.; Sun, T.; Guan, C. Imbalanced data augmentation for pipeline fault diagnosis: A multi-generator switching adversarial network. Control Eng. Pract. 2024, 144, 105839. [Google Scholar] [CrossRef]
  4. Shen, H.; Hu, X.; Wu, X.; He, S.; Wang, J. Generalized dissipative state estimation of singularly perturbed switched complex dynamic networks with persistent dwell-time mechanisms. IEEE Trans. Syst. Man, Cybern. Syst. 2022, 52, 1795–1806. [Google Scholar] [CrossRef]
  5. Liu, Y.; Wang, Z.; Ma, L.; Alsaadi, F.E. A partial-nodes-based information fusion approach to state estimation for discrete-time delayed stochastic complex networks. Inf. Fusion 2019, 49, 240–248. [Google Scholar] [CrossRef]
  6. Ma, X.; Zhou, H.; Li, Z. On the resilience of modern power systems: A complex network perspective. Renew. Sustain. Energy Rev. 2021, 152, 111646. [Google Scholar] [CrossRef]
  7. Zhang, J.; Wang, J.-A.; Zhang, J.; Li, M.; Zhao, Z.; Wen, X. Fixed-time event-triggered pinning synchronization of complex network via aperiodically intermittent control. Neurocomputing 2024, 614, 128818. [Google Scholar] [CrossRef]
  8. Wan, X.; Wang, Z.; Han, Q.; Wu, M. Finite-time H state estimation for discrete time-delayed genetic regulatory networks under stochastic communication protocols. IEEE Trans. Circuits Syst. Regul. Pap. 2018, 65, 3481–3491. [Google Scholar] [CrossRef]
  9. Gao, Y.; Liu, J.; Wang, Z.; Wu, L. Interval type-2 FNN-based quantized tracking control for hypersonic flight vehicles with prescribed performance. IEEE Trans. Syst. Man, Cybern. Syst. 2021, 51, 1981–1993. [Google Scholar] [CrossRef]
  10. Zhao, L.-H.; Wen, S.; Xu, M.; Shi, K.; Zhu, S.; Huang, T. PID control for output synchronization of multiple output coupled complex networks. IEEE Trans. Netw. Sci. Eng. 2022, 9, 1553–1566. [Google Scholar] [CrossRef]
  11. Wu, Y.; Shen, B.; Ahn, C.K.; Li, W. Intermittent dynamic event-triggered control for synchronization of stochastic complex networks. IEEE Trans. Circuits Syst. Regul. Pap. 2021, 68, 2639–2650. [Google Scholar] [CrossRef]
  12. Huang, C.; Cao, J.; Wen, F.; Yang, X. Stability analysis of SIR model with distributed delay on complex networks. PLoS ONE 2016, 11, e0158813. [Google Scholar] [CrossRef] [PubMed]
  13. Li, Y.; Zhou, X.; Li, B. Existence and global exponential stability of Weyl almost automorphic solution in finite dimensional distributions for SDINNs. Int. J. Syst. Sci. 2025, 56, 561–581. [Google Scholar] [CrossRef]
  14. Zhang, R.; Liu, H.; Liu, Y.; Tan, H. Dynamic event-triggered state estimation for discrete-time delayed switched neural networks with constrained bit rate. Syst. Sci. Control Eng. 2024, 12, 2334304. [Google Scholar] [CrossRef]
  15. Hou, N.; Wang, Z.; Dong, H.; Hu, J.; Liu, X. Sensor fault estimation for nonlinear complex networks with time delays under saturated innovations: A binary encoding scheme. IEEE Trans. Netw. Sci. Eng. 2022, 9, 4171–4183. [Google Scholar] [CrossRef]
  16. Hu, J.; Wang, Z.; Liu, G.-P.; Zhang, H. Variance-constrained recursive state estimation for time-varying complex networks with quantized measurements and uncertain inner coupling. IEEE Trans. Neural Netw. Learn. Syst. 2019, 31, 1955–1967. [Google Scholar] [CrossRef]
  17. Feng, S.; Li, X.; Zhang, S.; Jian, Z.; Duan, H.; Wang, Z. A review: State estimation based on hybrid models of Kalman filter and neural network. Syst. Sci. Control Eng. 2023, 11, 2173682. [Google Scholar] [CrossRef]
  18. Shen, Y.; Wang, Z.; Dong, H. Minimum-variance state and fault estimation for multirate systems with dynamical bias. IEEE Trans. Circuits Syst. II Express Briefs 2022, 69, 2361–2365. [Google Scholar] [CrossRef]
  19. Li, Q.; Wang, Z.; Sheng, W.; Alsaadi, F.E.; Alsaadi, F.E. Dynamic event-triggered mechanism for H non-fragile state estimation of complex networks under randomly occurring sensor saturations. Inf. Sci. 2020, 509, 304–316. [Google Scholar] [CrossRef]
  20. Liu, D.; Wang, Z.; Liu, Y.; Alsaadi, F.E.; Alsaadi, F.E. Recursive state estimation for stochastic complex networks under round-robin communication protocol: Handling packet disorders. IEEE Trans. Netw. Sci. Eng. 2021, 8, 2455–2468. [Google Scholar] [CrossRef]
  21. Li, X.; Zhang, P.; Dong, H. A robust covert attack strategy for a class of uncertain cyber-physical systems. IEEE Trans. Autom. Control 2024, 69, 1983–1990. [Google Scholar] [CrossRef]
  22. Ding, L.; Sun, W. Predefined time fuzzy adaptive control of switched fractional-order nonlinear systems with input saturation. Int. J. Netw. Dyn. Intell. 2023, 2, 100019. [Google Scholar] [CrossRef]
  23. Wang, Y.-A.; Shen, B.; Zou, L.; Han, Q.-L. A survey on recent advances in distributed filtering over sensor networks subject to communication constraints. Int. J. Netw. Dyn. Intell. 2023, 2, 100007. [Google Scholar] [CrossRef]
  24. Wang, Y.; Liu, H.-J.; Tan, H.-L. An overview of filtering for sampled-data systems under communication constraints. Int. J. Netw. Dyn. Intell. 2023, 2, 100011. [Google Scholar] [CrossRef]
  25. Gao, Y.; Xiao, F.; Liu, J.; Wang, R. Distributed soft fault detection for interval type-2 fuzzy-model-based stochastic systems with wireless sensor networks. IEEE Trans. Ind. Inform. 2019, 15, 334–347. [Google Scholar] [CrossRef]
  26. Wang, C.; Wang, Z.; Dong, H.; Lauria, S.; Liu, W.; Wang, Y.; Fadzil, F.; Liu, H. Fusionformer: A novel adversarial transformer utilizing fusion attention for multivariate anomaly detection. IEEE Trans. Neural Netw. Learn. Syst. 2025; in press. [Google Scholar] [CrossRef]
  27. Li, H.; Li, X.; Sun, Y.; Dong, H.; Xu, G. First-arrival picking for out-of-distribution noisy data: A cost-effective transfer learning method with tens of samples. IEEE Trans. Geosci. Remote Sens. 2024, 62, 1–13. [Google Scholar] [CrossRef]
  28. Song, J.; Zhou, S.; Niu, Y.; Cao, Z.; He, S. Anti-disturbance control for hidden Markovian jump systems: Asynchronous disturbance observer approach. IEEE Trans. Autom. Control 2023, 68, 6982–6989. [Google Scholar] [CrossRef]
  29. Wang, X.F. Complex networks: Topology, dynamics and synchronization. Int. J. Bifurc. Chaos 2002, 12, 885–916. [Google Scholar] [CrossRef]
  30. Gao, P.; Jia, C.; Zhou, A. Encryption-decryption-based state estimation for nonlinear complex networks subject to coupled perturbation. Syst. Sci. Control Eng. 2024, 12, 2357796. [Google Scholar] [CrossRef]
  31. Yang, X.; Cao, J.; Lu, J. Synchronization of Markovian coupled neural networks with nonidentical node-delays and random coupling strengths. IEEE Trans. Neural Netw. Learn. Syst. 2011, 60–71. [Google Scholar] [CrossRef]
  32. Gao, C.; Guo, B.; Xiao, Y.; Bao, J. Aperiodically synchronization of multi-links delayed complex networks with semi-Markov jump and their numerical simulations to single-link robot arms. Neurocomputing 2024, 575, 127286. [Google Scholar] [CrossRef]
  33. Hu, J.; Wang, Z.; Liu, G.-P. Delay compensation-based state estimation for time-varying complex networks with incomplete observations and dynamical bias. IEEE Trans. Cybern. 2022, 52, 12071–12083. [Google Scholar] [CrossRef] [PubMed]
  34. Shen, B.; Wang, Z.; Ding, D.; Shu, H. H state estimation for complex networks with uncertain inner coupling and incomplete measurements. IEEE Trans. Neural Netw. Learn. Syst. 2013, 24, 2027–2037. [Google Scholar] [CrossRef]
  35. Leung, H.; Seneviratne, C.; Xu, M. A novel statistical model for distributed estimation in wireless sensor networks. IEEE Trans. Signal Process. 2015, 63, 3154–3164. [Google Scholar] [CrossRef]
  36. Huo, N.; Shen, D. Encoding-decoding mechanism-based finite-level quantized iterative learning control with random data dropouts. IEEE Trans. Autom. Sci. Eng. 2019, 17, 1343–1360. [Google Scholar] [CrossRef]
  37. Yang, F.; Li, J.; Dong, H.; Shen, Y. Proportional-integral-type estimator design for delayed recurrent neural networks under encoding-decoding mechanism. Int. J. Syst. Sci. 2022, 53, 2729–2741. [Google Scholar] [CrossRef]
  38. Zou, L.; Wang, Z.; Shen, B.; Dong, H. Secure recursive state estimation of networked systems against eavesdropping: A partial-encryption-decryption method. IEEE Trans. Autom. Control, 2024; in press. [Google Scholar] [CrossRef]
  39. Zou, L.; Wang, Z.; Shen, B.; Dong, H. Encryption-decryption-based state estimation with multirate measurements against eavesdroppers: A recursive minimum-variance approach. IEEE Trans. Autom. Control 2023, 68, 8111–8118. [Google Scholar] [CrossRef]
  40. Zou, L.; Wang, Z.; Shen, B.; Dong, H. Recursive state estimation in relay channels with enhanced security against eavesdropping: An Innovative encryption-decryption framework. Automatica 2025, 174, 112159. [Google Scholar] [CrossRef]
  41. Liang, X.; Xu, J. Control for networked control systems with remote and local controllers over unreliable communication channel. Automatica 2018, 98, 86–94. [Google Scholar] [CrossRef]
  42. Li, J.; Wang, Z.; Dong, H.; Fei, W. Delay-distribution-dependent state estimation for neural networks under stochastic communication protocol with uncertain transition probabilities. Neural Netw. 2020, 130, 143–151. [Google Scholar] [CrossRef]
  43. Jin, Y.; Ma, X.; Meng, X.; Chen, Y. Distributed fusion filtering for cyber-physical systems under Round-Robin protocol: A mixed H2/H framework. Int. J. Syst. Sci. 2023, 54, 1661–1675. [Google Scholar] [CrossRef]
  44. Geng, H.; Wang, Z.; Chen, Y.; Yi, X.; Cheng, Y. Variance-constrained filtering fusion for nonlinear cyber-physical systems with the denial-of-service attacks and stochastic communication protocol. IEEE/CAA J. Autom. Sin. 2022, 9, 978–989. [Google Scholar] [CrossRef]
  45. Shen, Y.; Wang, Z.; Shen, B.; Dong, H. Outlier-resistant recursive filtering for multisensor multirate networked systems under weighted try-once-discard protocol. IEEE Trans. Cybern. 2020, 51, 4897–4908. [Google Scholar] [CrossRef] [PubMed]
  46. Li, X.; Dong, H.; Wang, Z.; Han, F. Set-membership filtering for state-saturated systems with mixed time-delays under weighted try-once-discard protocol. IEEE Trans. Circuits Syst. II Express Briefs 2018, 66, 312–316. [Google Scholar] [CrossRef]
  47. Hu, J.; Chen, W.; Wu, Z.; Chen, D.; Yi, X. Design of protocol-based finite-time memory fault detection scheme with circuit system application. IEEE Trans. Syst. Man Cybern. Syst. 2024, 54, 3110–3123. [Google Scholar] [CrossRef]
  48. Han, F.; Wang, Z.; Dong, H.; Alsaadi, F.E.; Alharbi, K.H. A local approach to distributed H-consensus state estimation over sensor networks under hybrid attacks: Dynamic event-triggered scheme. IEEE Trans. Signal Inf. Process. Over Netw. 2022, 8, 556–570. [Google Scholar] [CrossRef]
  49. Wu, W.; Yan, H.; Wang, Y.; Li, Z.; Wang, M. Fixed time cluster consensus for nonlinear multiagent systems by double dynamic event-triggered mechanisms. Int. J. Syst. Sci. 2024, 55, 3322–3336. [Google Scholar] [CrossRef]
  50. Hu, J.; Hu, Z.; Caballero-Aguila, R.; Chen, C.; Fan, S.; Yi, X. Distributed resilient fusion filtering for nonlinear systems with multiple missing measurements via dynamic event-triggered mechanism. Inf. Sci. 2023, 637, 118950. [Google Scholar] [CrossRef]
  51. Wang, W.; Ma, L.; Rui, Q.; Gao, C. A survey on privacy-preserving control and filtering of networked control systems. Int. J. Syst. Sci. 2024, 55, 2269–2288. [Google Scholar] [CrossRef]
  52. Li, J.; Wang, Z.; Dong, H.; Yi, X. Outlier-resistant observer-based control for a class of networked systems under encoding-decoding mechanism. IEEE Syst. J. 2020, 16, 922–932. [Google Scholar] [CrossRef]
  53. Gao, Y.; Hu, J.; Chi, K.; Jia, C.; Qi, J. A variance-constrained method to encoding-decoding H state estimation for memristive neural networks with energy harvesting sensor. Neurocomputing 2024, 579, 127448. [Google Scholar] [CrossRef]
  54. Jin, F.; Ma, L.; Zhao, C.; Liu, Q. A quantization-coding scheme with variable data rates for cyber-physical systems under DoS attacks. Syst. Sci. Control Eng. 2024, 12, 2348690. [Google Scholar] [CrossRef]
  55. Li, W.; Hou, N.; Yang, F.; Bu, X.; Sun, L. Finite-horizon variance-constrained H estimation for complex networks subject to dynamical bias using binary encoding schemes. IEEE Access 2023, 11, 142589–142600. [Google Scholar] [CrossRef]
  56. Liu, Q.; Wang, Z.; Dong, H.; Jiang, C. Remote estimation for energy harvesting systems under multiplicative noises: A binary encoding scheme with probabilistic bit flips. IEEE Trans. Autom. Control 2022, 68, 343–354. [Google Scholar] [CrossRef]
  57. Wen, P.; Dong, H.; Huo, F.; Li, J.; Lu, X. Observer-based PID control for actuator-saturated systems under binary encoding scheme. Neurocomputing 2022, 99, 54–62. [Google Scholar] [CrossRef]
  58. Chen, W.; Wang, Z.; Ding, D.; Dong, H. Consensusability of discrete-time multi-agent systems under binary encoding with bit errors. Automatica 2021, 133, 109867. [Google Scholar] [CrossRef]
  59. Wang, S.; Wang, Z.; Dong, H.; Chen, Y. A dynamic event-triggered approach to recursive nonfragile filtering for complex networks with sensor saturations and switching topologies. IEEE Trans. Cybern. 2022, 52, 11041–11054. [Google Scholar] [CrossRef]
  60. Zhao, D.; Wang, Z.; Wei, G.; Liu, X. Nonfragile H state estimation for recurrent neural networks with time-varying delays: On proportional-integral observer design. IEEE Trans. Neural Netw. Learn. Syst. 2021, 32, 3553–3565. [Google Scholar] [CrossRef]
  61. Xu, B.; Hu, X.; Li, S. Secure state estimation of memristive neural networks with dynamic self-triggered strategy subject to deception attacks. Neurocomputing 2024, 601, 128142. [Google Scholar] [CrossRef]
  62. Zhuang, J.; Peng, S.; Peng, H. Non-fragile exponential synchronisation of stochastic neural networks via aperiodic intermittent impulsive control. Int. J. Syst. Sci. 2024, 55, 1021–1036. [Google Scholar] [CrossRef]
  63. Zhang, S.; Wang, Z.; Ding, D.; Dong, H.; Alsaadi, F.E.; Hayat, T. Nonfragile H fuzzy filtering with randomly occurring gain variations and channel fadings. IEEE Trans. Fuzzy Syst. 2015, 24, 505–518. [Google Scholar] [CrossRef]
  64. Bu, X.; Dong, H.; Wang, Z.; Liu, H. Non-fragile distributed fault estimation for a class of nonlinear time-varying systems over sensor networks: The finite-horizon case. IEEE Trans. Signal Inf. Process. Over Netw. 2018, 5, 61–69. [Google Scholar] [CrossRef]
  65. Liu, Q.; Wang, Z.; He, X.; Ghinea, G.; Alsaadi, F.E. A resilient approach to distributed filter design for time-varying systems under stochastic nonlinearities and sensor degradation. IEEE Trans. Signal Process. 2016, 65, 1300–1309. [Google Scholar] [CrossRef]
  66. Li, X.; Song, J.; Hou, N.; Dai, D.; Yang, F. Finite-horizon distributed set-membership filtering with dynamical bias and DoS attacks under binary encoding schemes. Inf. Sci. 2023, 641, 119084. [Google Scholar] [CrossRef]
  67. Liu, Q.; Wang, Z. Moving-horizon estimation for linear dynamic networks with binary encoding schemes. IEEE Trans. Autom. Control 2020, 66, 1763–1770. [Google Scholar] [CrossRef]
  68. Liu, Y.; Wang, Z.; Liu, X. Global exponential stability of generalized recurrent neural networks with discrete and distributed delays. Neural Netw. 2006, 19, 667–675. [Google Scholar] [CrossRef]
  69. Cruz-Hernández, C.; Romero-Haros, N. Communicating via synchronized time-delay Chua’s circuits. Commun. Nonlinear Sci. Numer. Simul. 2008, 13, 645–659. [Google Scholar] [CrossRef]
  70. Liu, Y.; Wang, Z.; Yuan, Y.; Liu, W. Event-triggered partial-nodes-based state estimation for delayed complex networks with bounded distributed delays. IEEE Trans. Syst. Man Cybern. Syst. 2017, 49, 1088–1098. [Google Scholar] [CrossRef]
  71. Li, J.-Y.; Wang, Z.; Lu, R.; Xu, Y. Partial-nodes-based state estimation for complex networks with constrained bit rate. IEEE Trans. Netw. Sci. Eng. 2021, 8, 1887–1899. [Google Scholar] [CrossRef]
  72. Han, F.; Wang, Z.; Liu, H.; Dong, H.; Lu, G. Local design of distributed state estimators for linear discrete time-varying systems over binary sensor networks: A set-membership approach. IEEE Trans. Syst. Man, Cybern. Syst. 2024, 54, 5641–5654. [Google Scholar] [CrossRef]
  73. Hu, J.; Li, J.; Yan, H.; Liu, H. Optimized distributed filtering for saturated systems with amplify-and-forward relays over sensor networks: A dynamic event-triggered approach. IEEE Trans. Neural Netw. Learn. Syst. 2024, 35, 17742–17753. [Google Scholar] [CrossRef] [PubMed]
  74. Song, J.; Wang, Y.-K.; Niu, Y.; Lam, H.-K.; He, S.; Liu, H. Periodic event-triggered terminal sliding mode speed control for networked PMSM system: A GA-optimized extended state observer approach. IEEE/ASME Trans. Mechatronics 2022, 27, 4153–4164. [Google Scholar] [CrossRef]
  75. Liang, X.; Xu, J.; Wang, H.; Zhang, H. Decentralized output-feedback control with asymmetric one-step delayed information. IEEE Trans. Autom. Control 2023, 68, 7871–7878. [Google Scholar] [CrossRef]
Figure 1. The set of quantization values ( O ).
Figure 1. The set of quantization values ( O ).
Sensors 25 02880 g001
Figure 2. The diagram of state estimation (SE) for complex network (CN) (1).
Figure 2. The diagram of state estimation (SE) for complex network (CN) (1).
Sensors 25 02880 g002
Figure 3. Mode evolution.
Figure 3. Mode evolution.
Sensors 25 02880 g003
Figure 4. State estimation error of five nodes.
Figure 4. State estimation error of five nodes.
Sensors 25 02880 g004
Figure 5. The ideal and received measurement outputs.
Figure 5. The ideal and received measurement outputs.
Sensors 25 02880 g005
Figure 6. The norm of the estimation error e ( s ) .
Figure 6. The norm of the estimation error e ( s ) .
Sensors 25 02880 g006
Figure 7. The occurrence of random bit errors.
Figure 7. The occurrence of random bit errors.
Sensors 25 02880 g007
Figure 8. Chua’s circuit.
Figure 8. Chua’s circuit.
Sensors 25 02880 g008
Figure 9. Mode evolution.
Figure 9. Mode evolution.
Sensors 25 02880 g009
Figure 10. State estimation error of four nodes.
Figure 10. State estimation error of four nodes.
Sensors 25 02880 g010
Figure 11. The measurement output and the estimator input.
Figure 11. The measurement output and the estimator input.
Sensors 25 02880 g011
Figure 12. The norm of the estimation error e ( s ) .
Figure 12. The norm of the estimation error e ( s ) .
Sensors 25 02880 g012
Figure 13. The occurrence of random bit errors.
Figure 13. The occurrence of random bit errors.
Sensors 25 02880 g013
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Hou, N.; Li, W.; Song, Y.; Chang, M.; Bu, X. Non-Fragile Estimation for Nonlinear Delayed Complex Networks with Random Couplings Using Binary Encoding Schemes. Sensors 2025, 25, 2880. https://doi.org/10.3390/s25092880

AMA Style

Hou N, Li W, Song Y, Chang M, Bu X. Non-Fragile Estimation for Nonlinear Delayed Complex Networks with Random Couplings Using Binary Encoding Schemes. Sensors. 2025; 25(9):2880. https://doi.org/10.3390/s25092880

Chicago/Turabian Style

Hou, Nan, Weijian Li, Yanhua Song, Mengdi Chang, and Xianye Bu. 2025. "Non-Fragile Estimation for Nonlinear Delayed Complex Networks with Random Couplings Using Binary Encoding Schemes" Sensors 25, no. 9: 2880. https://doi.org/10.3390/s25092880

APA Style

Hou, N., Li, W., Song, Y., Chang, M., & Bu, X. (2025). Non-Fragile Estimation for Nonlinear Delayed Complex Networks with Random Couplings Using Binary Encoding Schemes. Sensors, 25(9), 2880. https://doi.org/10.3390/s25092880

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop