Next Article in Journal
Study of Stability and Simulation for Nonlinear (k, ψ)-Fractional Differential Coupled Laplacian Equations with Multi-Point Mixed (k, ψ)-Derivative and Symmetric Integral Boundary Conditions
Previous Article in Journal
Multigrid Methods for Computed Tomography
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Improved Model-Free Adaptive Predictive Control for Nonlinear Systems with Quantization Under Denial of Service Attacks

1
College of Electrical Engineering, Henan University of Technology, Zhengzhou 450001, China
2
Information Engineering University, Zhengzhou 450001, China
*
Author to whom correspondence should be addressed.
Symmetry 2025, 17(3), 471; https://doi.org/10.3390/sym17030471
Submission received: 12 February 2025 / Revised: 12 March 2025 / Accepted: 18 March 2025 / Published: 20 March 2025
(This article belongs to the Section Computer)

Abstract

:
In this paper, an improved model-free adaptive predictive control method is presented for unknown nonlinear systems with quantization to handle the limited network transmission capacity and denial of service (DoS) attacks. Firstly, to reduce the impact of the DoS attacks on the control system, an attack compensation mechanism is designed, which can be adjusted based on different attack strategies of attackers, and the elastic control of DoS attack can be realized for systems with different complexity and attack intensity. Secondly, a uniform quantizer with encoding and decoding mechanism is presented to tackle the network bandwidth limitation and to reduce the effects of quantization errors. Subsequently, an improved model-free adaptive predictive control method is designed, which can realize the tracking control task of the system with quantization under DoS Attacks. The boundedness of the tracking error of the control system is strictly proved by theoretical analysis. The proposed algorithm has certain symmetry in the prediction time domain and the control time domain. It predicts the state and output of the system at multiple times in the future at each sampling time, and calculates the optimal control sequence according to the predicted results. This kind of symmetric relationship between the prediction of the future and the optimization of the current control is reflected in time, so as to achieve the optimal performance of the system in the whole prediction interval. Finally, the effectiveness and robustness of the presented control method are verified by simulation results under both undisturbed and disturbed conditions.

Graphical Abstract

1. Introduction

Data-driven control (DDC) proposed in [1,2,3] is an effective method for complex nonlinear systems. By only utilizing system input/output (I/O) data to design the control algorithm, the DDC method can get rid of the dependence on the precise system model. Due to the advantages of DDC, it has been rapidly developed in method theory and practical application, such as PID control, iterative feedback tuning [4], virtual reference feedback tuning [5], iterative learning control (ILC) [6], model-free adaptive control (MFAC) [7], robot trajectory tracking control problem [8], and train operation control [9,10].
Among these DDC methods, the MFAC method [11] is the fastest developing and most complete method in theory and application. For unknown nonlinear multiagent systems consensus tracking problem, a distributed MFAC strategy is presented in [12]. In [13], an event triggered model-free adaptive iterative learning control (MFAILC) method is proposed to deal with the fading phenomenon of nonlinear systems. For false data injection attacks problem of MIMO nonlinear cyber–physical systems, according to partial form dynamic linearization, a new MFAC strategy is proposed in [14]. Considering disturbances and the over-speed protection of subway train control systems, an extended-state observer-based model-free adaptive iterative-learning energy-efficient control is presented in [15]. For the path tracking control problem, an enhanced MFAC method [16] is designed for a self-driving wheel excavator. In addition, due to its excellent control performance, robustness to model uncertainty and external disturbances, model predictive control (MPC) [17] is the most widely used control strategy. On the basis of the advantages of MPC and MFAC, a model-free adaptive predictive control (MFAPC) method is proposed in [18], which can handle the problem of the traditional MPC relying on the models. In [19], the MFAPC algorithm is also investigated for MIMO nonlinear discrete time systems. As can be seen from the above references, the MFAC method has received a lot of attention.
Currently, a network control systems (NCS) [20,21,22] composed of network channels, sensors, actuators, and controllers have been rapidly developed and widely used. The distinguishing feature of the NCS is that it connects cyberspace with physical space, making it possible to perform multiple tasks remotely. The NCS has many significant advantages. The control system only needs to transmit data through the network, which eliminates complex wiring. In addition, the NCS can reduce the complexity and cost of setting up the system, while increasing the flexibility of the system and reducing installation and maintenance costs. However, with the development of information technology, the network control system becomes more and more complex, and it is difficult to establish an accurate mathematical model.
In addition, for the NCS, there are also some issues with communication delay [23], packet loss [24], and quantization [25,26], where quantization is a pivotal problem that needs to be handled. Due to the limited transmission capacity of certain devices in networks and closed-loop systems, such as A/D and D/A converters, the data transmitted in practical NCS needs to be quantized before it can be sent to the next network node. Moreover, the network transmission burden is a significant problem to be dealt with in the NCS. Quantization is an effective method to reduce the amount of data and solve the network transmission burden while meeting the control requirements. In [27], a quantized feedback control method was proposed for discrete-time MIMO linear systems with input and output quantization. A quantized ILC for discrete-time systems [28] was presented, which can obtains bounded convergence of tracking errors. In [29], for the zero-error tracking issue, by using an encoding and decoding mechanism, a quantized ILC is also proposed. In [30,31], by only using I/O data, a quantized MFAC method is designed to ensure that the tracking error is convergent. In [32], a quantized data-driven MFAPC approach is designed for nonlinear systems, but the tracking error convergence analysis is lacking. For nonlinear multi-agent systems with uniform quantization, an event-triggered MFAC algorithm is presented in [33]. The literature reviewed above only considers quantitative problem. If the system is subjected to network attacks, the above works are no longer applicable.
Moreover, the introduction of communication network makes the NCS more open, but it also brings the risk of network attacks to the system. Network attacks not only destroy the performance of the control system, but also bring about disastrous consequences. Denial of service (DoS) [34,35,36,37] attacks send a large number of useless data packets to the system, blocking communication channels and preventing normal system data packets from being transmitted to the control center in a timely manner, resulting in the control center being unable to generate effective control signals in a timely manner. Therefore, the control problem of DoS attacks has been subject to wide concern. In [38], for networked control systems under DoS attacks, an adaptive event-triggered method is proposed. For nonlinear multiagent systems with output constraints and DoS attacks, a robust fuzzy adaptive event-triggered control scheme is designed in [39]. In [40], for high-speed train speed tracking with aperiodic DoS attacks and communication delays, an extended-state observer-based MFAILC algorithm is proposed. In [34], a distributed MFAC method is presented for nonlinear multiagent systems subjected to DoS attacks. In [41], an new event-triggered MFAC method was presented for unknown nonlinear systems under frequency duration constrained DoS attacks.
In conclusion, none of the references reviewed above have the ability to deal with both network bandwidth limitations and DoS attacks, and the DDC methods reviewed can only deal with a single DoS attack problem. Motivated by these observations, this paper investigates an improved model-free adaptive predictive control (IMFAPC) strategy for nonlinear systems with quantization to tackle limited network transmission capacity and DoS attacks. Compared with the existing works, the main contributions of this paper are addressed as follows.
  • Network bandwidth limitation and DoS attacks are handled simultaneously for nonlinear systems only utilizing the I/O data to design control methods. The proposed IMFAPC method can eliminate the dependence on the system model, which is a data-driven control method.
  • An attack compensation mechanism is presented to reduce the impact of the DoS attacks on the control system, which can be adjusted according to the different attack strategies of attackers, and the elastic control of the DoS attack can be realized for systems with different complexity and attack intensity.
  • A uniform quantizer with encoding and decoding mechanisms is proposed to settle the network bandwidth limitation and to reduce the effects of quantization errors. Furthermore, the convergence analysis of the proposed control method is carried out, and the tracking error is proved to be bound.
The rest of the paper is given as follows. Section 2 addresses the problem formulation. The design and analysis of the IMFAPC method for the nonlinear system with quantization under DoS attacks are developed in Section 3. In Section 4, simulations are given to illustrate the effectiveness and robustness of proposed method. Section 5 summarizes this paper.

2. Problem Formulation

The following unknown discrete time single-input single-output (SISO) nonlinear system is considered:
γ ( t + 1 ) = Z ( γ ( t ) , γ ( t 1 ) , , γ ( t n ϒ ) , u ( t ) , u ( t 1 ) , , u ( t n u ) )
where t signifies the time. γ ( t ) R stands for the system output. u ( k ) R represents the system input. n γ and n u denote two unknown integers. Z ( ) stands for the unknown nonlinear function.
The following two assumptions are given for the nonlinear system (1).
Assumption 1.
The partial derivative of  Z ( )  is continuously differentiable for all t with finite exceptions.
Assumption 2.
The system (1) is a generalized Lipschitz system, which satisfies  γ ( t 1 + 1 ) γ ( t 2 + 1 ) b u ( t 1 + 1 ) u ( t 2 + 1 ) , where u ( t 1 ) u ( t 2 ) ,  t 1 t 2 , and b represents a positive constant.
Remark 1.
From a practical point of view, these assumptions imposed on the system are reasonable and acceptable. Assumption 1 is a typical constraint for general nonlinear systems in the field of control system design. Assumption 2 imposes an upper bound on the change rate of the system output driven by the change in the control input, where b depends on the system parameters. From an energy viewpoint, the energy change inside a system cannot go to infinity if the energy change in the control input is at a finite level.
Theorem 1.
([42]). For the unknown nonlinear system (1) satisfying Assumptions 1–2, if Δ u ( t ) 0 , system (1) can be converted to a compact-form dynamic linearization data model with the time-varying parameter  φ ( t ) R .
Δ γ ( t + 1 ) = φ ( t ) Δ u ( t )
where φ ( t ) c ¯ , c ¯  denotes a constant.  Δ γ ( t + 1 ) = γ ( t + 1 ) γ ( t ) ,  Δ u ( t ) = u ( t ) u ( t 1 ) .

2.1. DoS Attacks

DoS attacks send a large number of useless packets to the network channel to prevent the transmission of real data and thus destroy the data availability. Therefore, the attacker launches DoS attacks on the network control system, resulting in packet loss and failure of the control task.
When DoS attacks occur on the network’s control system, the system out data packet is represented as follows:
γ D o S ( t ) = ћ ( t ) γ ( t )
where ћ ( t ) 0 , 1 is a random variable that satisfies the Bernoulli distribution. ћ ( t ) = 0 indicates that the attacks succeed and that the controller cannot receive the data packet. ћ ( t ) = 1 indicates that the attacks have failed and that the controller can receive data packets normally. Considering the energy limitation of the attacker, assuming the probability of attack failure is P ћ ( t ) = 1 = ћ ¯ , ћ ¯ [ 0 , 1 ] . The probability of attack success is P ћ ( t ) = 0 = 1 ћ ¯ .
To reduce the impact of the DoS attacks on the control system, the attack compensation mechanism can be conducted as follows:
γ c D o S ( t ) = ћ ( t ) γ ( t ) + ( 1 ћ ( t ) ) γ ( t l )
where γ ( t l ) is the last unattacked output signal before time t. The attack compensation mechanism (4) can be adjusted according to different attack strategies of attackers, which can handle DoS attacks of different complexity and intensity.
The control task in this article is to design suitable data driven control method to track the reference trajectory γ * ( t ) .

2.2. Prediction Equation

On the basis of data model (2) and the attack compensation mechanism (4), the one-step-ahead prediction equation is
γ c D o S ( t + 1 ) = γ c D o S ( t ) + φ ( t ) Δ u ( t )
Hance, in terms of (5), the following N-step ahead prediction equations are obtained:
γ c D o S ( t + 1 ) = γ c D o S ( t ) + φ ( t ) Δ u ( t ) γ c D o S ( t + 2 ) = γ c D o S ( t + 1 ) + φ ( t + 1 ) Δ u ( t + 1 ) = γ c D o S ( t ) + φ ( t ) Δ u ( t ) + φ ( t + 1 ) Δ u ( t + 1 ) γ c D o S ( t + N ) = γ c D o S ( t + N 1 ) + φ ( t + N 1 ) Δ u ( t + N 1 ) = γ c D o S ( t + N 2 ) + φ ( t + N 2 ) Δ u ( t + N 2 ) + φ ( t + N 1 ) Δ u ( t + N 1 ) = γ c D o S ( t ) + φ ( t ) Δ u ( t ) + + φ ( t + N 1 ) Δ u ( t + N 1 )
To facilitate the design of control method and analysis, (6) can be converted to a compact form.
𝜰 N ( t + 1 ) = F ( t ) γ c D o S ( t ) + G ( t ) Δ U N ( t )
in which 𝜰 N ( t + 1 ) = [ γ c D o S ( t + 1 ) , , γ c D o S ( t + N ) ] T , F ( t ) = [ 1 , 1 , , 1 ] T , and Δ U N ( t ) = [ Δ u ( t ) , , Δ u ( t + N 1 ) ] T .
G ( t ) = φ ( t ) 0 0 0 0 0 φ ( t ) φ ( t + 1 ) 0 0 0 0 φ ( t ) φ ( t + N u 1 ) 0 φ ( t ) φ ( t + 1 ) φ ( t + N u 1 ) φ ( t + N 1 ) R N × N .
Furthermore, if Δ u ( k + j 1 ) = 0 , j > N u , it can be derived that
𝜰 N ( t + 1 ) = F ( t ) γ c D o S ( t ) + G 1 ( t ) Δ U N n ( t )
G 1 ( k ) = φ ( t ) 0 0 0 φ ( t ) φ ( t + 1 ) 0 0 0 φ ( t ) φ ( t + N u 1 ) φ ( t ) φ ( t + 1 ) φ ( t + N u 1 ) R N × N u
where Δ U N u ( k ) = [ Δ u ( k ) , , Δ u ( k + N u 1 ) ] T , N u N denotes the control horizon.

2.3. Uniform Quantizer and Encoding and Decoding Mechanism

In this article, a quantification of the output data is utilized to settle the problem of the network bandwidth limitations of the system (1). On the basis of [43,44], the uniform quantizer is proposed by
q ( z ) = 0 , z ( 1 2 , 1 2 ) i , z ( 2 i 1 2 , 2 i + 1 2 ) q ( z ) , z ( , 1 2 ]
where z is the variable of the uniform quantizer. i = 1 , 2 , , L q . L q stands for the largest quantization level.
The quantization error is defined as ε q ( t ) = q ( γ c D o S ( t ) ) γ c D o S ( t ) . According to the properties of the uniform quantizer (9), ε q ( t ) is qualified by a constant, namely ε q ( t ) 1 / 2 . Obviously, the uniform quantizer can cause persistent errors that cannot be eliminated naturally. Therefore, the encoding and decoding mechanism is adopted to reduce the impact of quantization errors and improve quantization accuracy. The output data of the system are first encoded and quantified and then decoded, and the decoded data are applied to the control system. In this article, the following encoding and decoding mechanism is given.
According to [45], the encoder is constructed as
m ( 0 ) = 0 σ ( t + 1 ) = q γ c D o S ( t + 1 ) m ( t ) υ ( t ) m ( t + 1 ) = υ ( t ) σ ( t + 1 ) + m ( t )
The decoder is given by
γ c D o S ( 0 ) = 0 γ c D o S ( t + 1 ) = γ c D o S ( t ) + υ ( t ) σ ( t + 1 )
in which σ ( t + 1 ) is the output of the encoder and also the input of the decoder. γ c D o S ( t + 1 ) and m ( t + 1 ) are the input and internal state of encoder, respectively. γ c D o S ( t + 1 ) is the decoder’s output, which can be considered as an estimate of γ c D o S ( k + 1 ) . υ ( t ) is utilized to adjust the difference between the encoder estimation and the system output. 0 < υ ( t ) 1 , lim t υ ( t ) = 0 .
In terms of (10) and (11), if Δ γ c D o S ( t + 1 ) is the quantization information, we have the following the encoder:
m Δ ( 0 ) = 0 σ Δ ( t + 1 ) = q Δ γ c D o S ( t + 1 ) m Δ ( t ) υ ( t ) m Δ ( t + 1 ) = υ ( t ) σ Δ ( t + 1 ) + m Δ ( t )
The decoder is given by
Δ γ c D o S ( 0 ) = 0 Δ γ c D o S ( t + 1 ) = Δ γ c D o S ( t ) + υ ( t ) σ Δ ( t + 1 )
in which Δ γ c D o S ( t + 1 ) , σ Δ ( t + 1 ) , and m Δ ( t + 1 ) denote the input, output, and internal state of the encoder, respectively. Δ γ c D o S ( k + 1 ) is the output of the decoder. Δ γ c D o S ( k + 1 ) = γ c D o S ( k + 1 ) γ c D o S ( k ) .

3. Control Algorithm Design and Analysis

The following performance index functions are given to design the control algorithm.
J ( Δ U N u ( t ) ) = [ 𝜰 N r ( t + 1 ) 𝜰 N ( t + 1 ) ] T [ 𝜰 N r ( t + 1 ) 𝜰 N ( t + 1 ) ] + λ Δ U N u T ( t ) Δ U N u ( t )
J ( φ ( t ) ) = Δ γ c D o S ( t ) φ ( t 1 ) Δ u ( t 1 ) 2 + μ φ ( t ) φ ^ ( t 1 ) 2
where 𝜰 N ( t + 1 ) = [ γ c D o S ( t + 1 ) , , γ c D o S ( t + N ) ] T .
By minimizing the performance index functions (14) and (15), an IMFAPC strategy with attack compensation mechanism is presented as follows.
φ ^ ( t ) = φ ^ ( t 1 ) + η Δ u ( t 1 ) μ + Δ u ( t 1 ) 2 [ Δ γ c D o S ( t ) φ ^ ( t 1 ) Δ u ( t 1 ) ]
φ ^ ( t ) = φ ^ ( 1 ) , i f   φ ^ ( t ) ε   or   Δ u ( t 1 ) ε   or   sign ( φ ^ ( t ) ) sign ( φ ^ ( 1 ) )
θ ( t ) = θ ( t 1 ) + φ ^ ( t 1 ) δ + φ ^ ( t 1 ) 2 [ φ ^ ( t ) φ ^ T ( t 1 ) θ ( t 1 ) ]
θ ( k ) = θ ( 1 ) ,   if   θ ( t ) M
φ ^ ( t + j ) = θ 1 ( t ) φ ^ ( t + j 1 ) + θ 2 ( t ) φ ^ ( t + j 2 ) + + θ n p ( t ) φ ^ ( t + j n p )
φ ^ ( t + j ) = φ ^ ( 1 ) , i f   φ ^ ( t + j ) ε   or   sign ( φ ^ ( t + j ) ) sign ( φ ^ ( 1 ) )
u ( t ) = u ( t 1 ) + g T G ^ 1 T ( t ) G 1 ( t ) + λ I 1 G ^ 1 T ( t ) 𝜰 N * ( t + 1 ) F ( t ) γ c D o S ( t )
where λ > 0 and μ > 0 are weighting factors, and η ( 0 , 1 ] stands for step size factor, δ ( 0 , 1 ] . ε and M denote positive constants. G ^ 1 T ( t ) and φ ^ ( t + j ) denote the estimated values of G 1 ( t ) and φ ( t + j ) , j = 1 , 2 , , N , respectively. 𝜰 N * ( t + 1 ) = [ γ * ( t + 1 ) , , γ * ( t + N ) ] T and g = [ 1 , 0 , , 0 ] T . θ k ( t ) , k = 1 , , n p is the parameter of the auto-regressive model (20) which can be obtained using algorithm (18). According to the past estimated sequence ϕ ^ ( 1 ) , , ϕ ^ ( k ) , the auto-regressive model (20) is utilized to estimate ϕ ( k + 1 ) , , ϕ ( k + N u 1 ) . θ ( t ) = [ θ 1 ( t ) , , θ n p ( t ) ] T . φ ^ ( t 1 ) = [ φ ^ ( t 1 ) , , φ ^ ( t n p ) ] T . n p is the prediction order. Δ γ c D o S ( t ) = γ c D o S ( t ) γ c D o S ( t 1 ) . Equation (17) is a reset algorithm that can make the parameter estimation algorithm (16) have strong time-varying parameter tracking ability. Equation (19) is used to ensure the boundedness of A ^ 1 ( k ) . Equation (21) is to guarantee that the prediction parameters’ sign remains unchanged.
Remark 2.
The proposed IMFAPC algorithm (16)–(22) has a certain symmetry in the prediction time domain and the control time domain. It predicts the state and output of the system at multiple times in the future at each sampling time and calculates the optimal control sequence according to the predicted results. This kind of symmetric relationship between the prediction of the future and the optimization of the current control is reflected in time, so as to achieve the optimal performance of the system in the whole prediction interval.
Figure 1 is a block diagram of the control system under a DoS attack that uses the proposed IMFAPC method. According to Figure 1, firstly, the network attack occurs at the output of the system, and the system output data after the attack are processed by the attack compensation mechanism. Secondly, a uniform quantizer with an encoding and decoding mechanism is given to deal with the network bandwidth limitation and to reduce the effects of quantization errors. Finally, based on the quantized output data, the designed IMFAPC method is applied to the system.
The IMFAPC algorithm working procedure is summarized in Algorithm 1. According to the IMFAPC method (16)–(22), it is clear that the proposed control algorithm is designed only utilizing I/O data, which is a data-driven control method. In addition, an attack compensation mechanism (4) is introduced, which can be adjusted according to the different attack strategies of attackers, and the elastic control of the DoS attack can be realized for systems with different complexities and attack intensities.
Algorithm 1: IMFAPC Design for network bandwidth limitation and DoS attacks
1:
Given the initial inputs and initial output of the system, select a set of values for controller parameter ( ε , λ , μ , η , δ , t , M , ϕ ^ , θ , N , N u , n p , ћ ¯ ).
2:
Set desired trajectory.
3:
According to the proposed IMFAPC (16)–(22), Calculate, φ ^ ( t ) ,   θ ( t ) ,   u ( t ) ,   γ c D o S ( t ) .
4:
Until the tracking error meets the requirements of the tracking task.
Theorem 2.
Consider the nonlinear system (1) satisfying Assumptions 1–2 with the IMFAPC algorithm (17)–(24). If  γ * ( t + 1 ) = γ * = const  and the parameter meets condition  μ > η 2 / 16 , the tracking error  e ( t + 1 ) = γ * γ c D o S ( t + 1 )  of the system is uniformly ultimate bounded, as t goes to infinity.
Proof of Theorem 2.
The proof of Theorem 2 consists of three parts. Part A is the boundedness of φ ^ ( t ) . Part B proves that the tracking error of the system (5) is uniformly ultimate bounded. Part C proves that the tracking error of the system (2) is uniformly ultimate bounded.
Part A is to prove boundedness of φ ^ ( t ) .
From (4), (5), and (11), one has
γ c D o S ( t + 1 ) = γ c D o S ( t ) + υ ( t ) q γ c D o S ( t + 1 ) m ( t ) υ ( t ) = γ c D o S ( t ) + υ ( t ) q γ c D o S ( t + 1 ) m ( t ) υ ( t ) γ c D o S ( t + 1 ) m ( t ) υ ( t ) + γ c D o S ( t + 1 ) m ( t ) υ ( t ) = γ c D o S ( t ) + υ ( t ) ε q ( t + 1 ) + γ c D o S ( t + 1 ) m ( t ) υ ( t ) = γ c D o S ( t ) + γ c D o S ( t + 1 ) + υ ( t ) ε q ( t + 1 ) m ( t )
From the uniform quantizer and encoding and decoding mechanisms, we have
γ c D o S ( t + 1 ) m ( t + 1 ) = γ c D o S ( t ) + υ ( t ) σ ( t + 1 ) υ ( t ) σ ( t + 1 ) + m ( t ) = γ c D o S ( t ) m ( t ) = γ c D o S ( t 1 ) m ( t 1 ) = = γ c D o S ( 0 ) m ( 0 ) = 0
According to (23) and (24), it can be derived that
γ c D o S ( t + 1 ) = γ c D o S ( t + 1 ) + υ ( t ) ε q ( t + 1 )
In the same way, one yields
Δ γ c D o S ( t + 1 ) = Δ γ c D o S ( t + 1 ) + υ ( t ) ε Δ q ( t + 1 )
where ε Δ q ( t + 1 ) = q Δ γ c D o S ( t + 1 ) m Δ ( t ) υ ( t ) Δ γ c D o S ( t + 1 ) m Δ ( t ) υ ( t ) , ε Δ q ( t + 1 ) 1 2 .
The parameter estimation error is defined as φ ˜ ( t ) = φ ^ ( t ) φ ( t ) .
From (16) and (5), it follows that
φ ˜ ( t ) = φ ˜ ( t 1 ) + φ ( t 1 ) φ ( t ) + η Δ u ( t 1 ) μ + Δ u ( t 1 ) 2 [ Δ γ c D o S ( t ) φ ^ ( t 1 ) Δ u ( t 1 ) ] = φ ˜ ( t 1 ) Δ φ ( t ) + η Δ u ( t 1 ) μ + Δ u ( t 1 ) 2 [ Δ γ c D o S ( t ) + υ ( t 1 ) ε Δ q ( t ) φ ^ ( t 1 ) Δ u ( t 1 ) ] = φ ˜ ( t 1 ) Δ φ ( t ) + η Δ u ( t 1 ) μ + Δ u ( t 1 ) 2 [ φ ( t 1 ) Δ u ( t 1 ) φ ^ ( t 1 ) Δ u ( t 1 ) + υ ( t 1 ) ε Δ q ( t ) ] = φ ˜ ( t 1 ) + η Δ u ( t 1 ) μ + Δ u ( t 1 ) 2 [ φ ˜ ( t 1 ) Δ u ( t 1 ) ] + η Δ u ( t 1 ) μ + Δ u ( t 1 ) 2 υ ( t 1 ) ε Δ q ( t ) Δ φ ( t ) = φ ˜ ( t 1 ) + η Δ u ( t 1 ) 2 μ + Δ u ( t 1 ) 2 φ ˜ ( t 1 ) + η υ ( t 1 ) ε Δ q ( t ) Δ u ( t 1 ) μ + Δ u ( t 1 ) 2 Δ φ ( t ) = 1 η Δ u ( t 1 ) 2 μ + Δ u ( t 1 ) 2 φ ˜ ( t 1 ) + η υ ( t 1 ) ε Δ q ( t ) Δ u ( t 1 ) μ + Δ u ( t 1 ) 2 Δ φ ( t )
According to φ ( t ) c ¯ in Theorem 1, we have φ ( t ) φ ( t 1 ) 2 c ¯ . Taking the absolute value on both sides of (27) yields
φ ˜ ( t ) 1 η Δ u ( t 1 ) 2 μ + Δ u ( t 1 ) 2 φ ˜ ( t 1 ) + η υ ( t 1 ) ε Δ q ( t ) Δ u ( t 1 ) μ + Δ u ( t 1 ) 2 + Δ φ ( t ) 1 η Δ u ( t 1 ) 2 μ + Δ u ( t 1 ) 2 φ ˜ ( t 1 ) + η υ ( t 1 ) ε Δ q ( t ) Δ u ( t 1 ) μ + Δ u ( t 1 ) 2 + 2 c ¯
Due to η ( 0 , 1 ] and μ > 0 , there must exist a positive constant b u such that
0 < 1 η Δ u ( t 1 ) 2 μ + Δ u ( t 1 ) 2 b u < 1
Take μ > η 2 16 ; there must exist a positive constant b 1 such that
0 < η υ ( t 1 ) ε Δ q ( t ) Δ u ( t 1 ) μ + Δ u ( t 1 ) 2 η Δ u ( t 1 ) μ + Δ u ( t 1 ) 2 υ ( t 1 ) ε Δ q ( t ) η Δ u ( t 1 ) 2 μ Δ u ( t 1 ) υ ( t 1 ) ε Δ q ( t ) η 2 μ × 1 × 1 2 η 4 μ = b 1 < 1
In the light of (28)–(30), it leads to
φ ˜ ( t ) b u φ ˜ ( t 1 ) + b 1 + 2 c ¯ b u t 1 φ ˜ ( 1 ) + b 1 + 2 c ¯ 1 b u
Therefore, φ ˜ ( t ) is bounded. Since φ ( t ) is bounded, φ ^ ( t ) is also bounded. From (18)–(21), it is clear that the boundedness of the prediction values φ ^ ( t + j ) , j = 1 , , N u 1 is guaranteed.
Part B proves that the tracking error of the system (5) is uniformly ultimate bounded.
The tracking error of the system is e ( t + 1 ) = γ * γ c D o S ( t + 1 ) .
From (23) and (25), one has
e ( t + 1 ) = γ * γ c D o S ( t + 1 ) = γ * γ c D o S ( t + 1 ) υ ( t ) ε q ( t + 1 ) = γ * γ c D o S ( t ) φ ( t ) Δ u ( t ) υ ( t ) ε q ( t + 1 ) = γ * γ c D o S ( t ) φ ( t ) g T G ^ 1 T ( t ) G 1 ( t ) + λ I 1 G ^ 1 T ( t ) × 𝜰 N r ( t + 1 ) F ( t ) γ c D o S ( t ) υ ( t ) ε q ( t + 1 ) = γ * γ c D o S ( t ) φ ( t ) g T G ^ 1 T ( t ) G 1 ( t ) + λ I 1 × G ^ 1 T ( t ) F ( t ) γ * γ c D o S ( t ) υ ( t ) ε q ( t + 1 ) = 1 φ ( t ) g T G ^ 1 T ( t ) G 1 ( t ) + λ I 1 G ^ 1 T ( t ) F ( t ) × γ * γ c D o S ( t ) υ ( t ) ε q ( t + 1 )
Since ε q ( t ) 1 / 2 , 0 < υ ( t ) 1 . Taking absolute value on both sides of (32), it further leads to
e ( t + 1 ) 1 φ ( t ) g T G ^ 1 T ( t ) G 1 ( t ) + λ I 1 G ^ 1 T ( t ) e ( t ) + υ ( t ) ε q ( t + 1 ) 1 φ ( t ) g T G ^ 1 T ( t ) G 1 ( t ) + λ I 1 G ^ 1 T ( t ) e ( t ) + 1 2
Define H = G ^ 1 T ( t ) G 1 ( t ) + λ I . Because G ^ 1 T ( t ) G 1 ( t ) is a semi-positive definite matrix, H and H 1 are the positive definite matrixes for λ > 0 .
It is clear that H 1 = H * det ( H ) , where H * = H 11 H N u 1 H 1 N u H N u N u is the adjoint matrix of H . H i j is the algebraic cofactor of H .
Therefore, it can be derived that
g T G ^ 1 T ( t ) G 1 ( t ) + λ I 1 G ^ 1 T ( t ) F ( t ) = g T H 1 G ^ 1 T ( t ) F ( t ) = g T H * det ( H ) G ^ 1 T ( t ) F ( t ) = N φ ^ ( t ) H 11 det ( H ) + ( N 1 ) φ ^ ( t + 1 ) H 21 det ( H ) + + ( N N u + 1 ) φ ^ ( t N u + 1 ) H N u 1 det ( H )
Since φ ^ ( t ) is bounded, (34) is bounded and its upper bound is constant.
Because H is a positive definite matrix, det ( H ) > 0 is monic polynomial in λ of degree N u . H 11 is monic polynomial in λ of degree ( N u 1 ) . H i 1 is monic polynomial in λ of degree ( N u 2 ) , where i = 2 , 3 , , N u . There must exists a constant λ _ > 0 , such that (34) has the same positive sign as H 11 det ( H ) for λ λ _ .
Hence, there must exist a positive constant b 2 such that
0 < 1 φ ( t ) g T G ^ 1 T ( t ) G 1 ( t ) + λ I 1 G ^ 1 T ( t ) F ( t ) b 2 < 1
From (33) and (35), one can conclude that
e ( t + 1 ) b 2 e ( t ) + 1 2 b 2 t e ( 1 ) + 1 2 ( 1 b 2 )
According to (36), it can be seen that the tracking error of the system is uniformly ultimate bounded, and the bound is 1 2 ( 1 b 2 ) .
Part C proves that the tracking error of the system (2) is uniformly ultimate bounded. Define the tracking error of the system (2) as e o ( t + 1 ) = γ * γ ( t + 1 ) .
Case 1: When ћ ( t ) = 1 , the system is not attacked. We have
γ c D o S ( t ) = γ ( t )
From (25), It follows that
e o ( t + 1 ) = γ * γ ( t + 1 ) = γ * γ c D o S ( t + 1 ) = γ * γ c D o S ( t + 1 ) + υ ( t ) ε q ( t + 1 )
Take the absolute values on both sides of (38) and according to part B, one has
e o ( t + 1 ) γ * γ c D o S ( t + 1 ) + υ ( t ) ε q ( t + 1 ) e ( t + 1 ) + 1 2 b 2 t e ( 1 ) + 2 b 2 2 ( 1 b 2 )
Hence, the tracking error of the system (2) is bounded.
Case 2: When ћ ( t ) = 0 , the system is attacked. One has
γ c D o S ( t ) = γ ( t l )
According to (25), we have
e o ( t + 1 ) = γ * γ ( t + 1 ) = γ * γ c D o S ( t + 1 l ) = γ * γ c D o S ( t + 1 l ) + υ ( t l ) ε q ( t + 1 l )
From part B, it further leads to
e o ( t + 1 ) e ( t + 1 l ) + υ ( t + 1 ) ε q ( t + 2 ) b 2 t l e ( 1 ) + 2 b 2 2 ( 1 b 2 )
Thus, the proof of Theorem 2 is finished. □

4. Simulation Study

In this section, to show the correctness and robustness of the proposed IMFAPC approach, numerical simulations are conducted compared to a quantized data-driven model-free adaptive predictive control (QDDMFAPC) [32]. The following nonlinear system is given for the simulation.
γ ( t + 1 ) = 2.5 γ ( t ) γ ( t 1 ) 1 + γ ( t ) 2 + γ ( t 1 ) 2 + 0.7 sin ( 0.5 ( γ ( t ) + γ ( t 1 ) ) ) × cos ( 0.5 ( γ ( t ) + γ ( t 1 ) ) ) + 1.2 u ( t ) + 1.4 u ( t 1 ) , 1 t 500 0.1 γ ( t ) 0.2 γ ( t 1 ) 0.3 γ ( t 3 ) + 1.1 u ( t ) + 1.4 u ( t 1 ) + 0.01 u ( t 2 ) , 500 < t 1000
The reference trajectory is γ * ( t + 1 ) = 5 × ( 1 ) r o u n d ( t / 200 ) .

4.1. Without Disturbance

The initial values of the control system are given by y ( 1 : 5 ) = 0 , u ( 1 : 4 ) = 0 . The parameters selection for the IMFAPC method is ε = 10 3 , λ = 18 , μ = 10 4 , η = 1 , δ = 0.5 , t 1 , M = 10 , ϕ ^ ( 1 : 5 ) = 1.5 , θ ( 1 : 4 ) = 0.3 , N = 5 , N u = 1 , n p = 3 . The parameter of DoS attacks is given by ћ ¯ = 0.5 . Figure 2 is random variable ћ ( t ) 0 , 1 .
Figure 3 plots the output tracking profiles of the system output γ ( t ) and γ c D o S ( t ) . Figure 4 is the control input profile. Figure 5 plots the tracking error of the system output γ ( t ) and γ * ( t ) . It can be seen from Figure 3 and Figure 5 that the presented IMFAPC algorithm has better control performance under DoS attacks than the QDDMFAPC method.
Table 1 shows the average error of the proposed IMFAPC algorithm and the existing QDDMFAPC algorithm. It can be seen from Table 1 that the proposed control algorithm has better tracking performance under network attacks and quantization without disturbance.

4.2. With Disturbance

In order to verify the correctness and robustness of the presented method, the disturbance d(t) is considered, as shown in Figure 6.
d ( t ) = 2 × sin ( 2 π t / 50 ) ,   300 t 400 2 × rand ( 1 ) ,                 600 < t 700 0 ,                                                     Others .
Under the disturbance, Figure 7 shows random variable ћ ( t ) 0 , 1 with ћ ¯ = 0.5 . Figure 8 is the tracking profiles of the control system output γ ( t ) and γ c D o S ( t ) . Figure 9 plots the control input profile with disturbance by using IMFAPC and QDDMFAPC. Figure 10 plots the tracking error. From Figure 8 and Figure 10, it is clear that the system can still achieve good tracking performance under DoS attacks and disturbance, which indicates that the proposed control algorithm is robust.
Table 2 shows the average error of the proposed IMFAPC algorithm and the existing QDDMFAPC algorithm under disturbance. It can be seen from Table 2 that the proposed control algorithm has strong robustness compared to QDDMFAPC.
Under the without disturbance and with disturbance conditions, the system control performance can be obtained when data quantization and DoS attacks are considered, which verifies the effectiveness and robustness of the proposed method. Therefore, the simulation results demonstrate the conclusion of Theorem 2.
Table 3 shows the abbreviations that appear in the paper and some primary notation definitions.

5. Conclusions

In this paper, for unknown nonlinear systems, in order to handle the limited network transmission capacity and DoS attacks, an IMFAPC method is designed. Firstly, considering the impact of the DoS attacks on the control system, an attack compensation mechanism is proposed. Secondly, a uniform quantizer and an encoding and decoding mechanism are proposed to handle the network bandwidth limitation and to reduce the effects of quantization errors. A theoretical analysis of the proposed control method is conducted to illustrate that the tracking error is bounded. Finally, the effectiveness and robustness of the presented control method are verified using simulation results under both undisturbed and disturbed conditions compared to QDDMFAPC. In this paper, the proposed method can only deal with a single-network attack problem, but it is powerless to deal with hybrid network attacks. In the future, we will study data-driven control methods under hybrid attacks.

Author Contributions

Conceptualization, G.L.; methodology, G.L.; software, G.L. and J.Z.; validation, G.L., J.Z., Y.W. (Yule Wang) and Y.W. (Yangyang Wang); formal analysis, G.L. and Y.W. (Yangyang Wang); investigation, G.L.; writing—original draft preparation, G.L.; writing—review and editing, G.L. and Y.W. (Yangyang Wang); supervision, G.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China under Grant 62203151, Scientific and Technological Project of Henan Province of China under Grant 252102240132, and High-level Talents Fund Project of Henan University of Technology under Grant 2021BS084.

Data Availability Statement

Data are contained within the article.

Acknowledgments

The authors would like to thank the anonymous reviewers for their helpful comments.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Hou, Z.S.; Xu, J.X. On data-driven control theory: The state of the art and perspective. Acta Autom. Sin. 2009, 35, 650–667. [Google Scholar] [CrossRef]
  2. Hou, Z.S.; Chi, R.; Gao, H. An overview of dynamic-linearization-based data-driven control and applications. IEEE Trans. Ind. Electron. 2017, 64, 4076–4090. [Google Scholar] [CrossRef]
  3. Hou, Z.; Gao, H.; Lewis, F.L. Data-driven control and learning systems. IEEE Trans. Ind. Electron. 2017, 64, 4070–4075. [Google Scholar]
  4. Hjalmarsson, H.; Gunnarsson, S.; Gevers, M. A Convergent Iterative Restricted Complexity Control Design Scheme. In Proceedings of the 33rd IEEE Conference on Decision and Control, Lake Buena Vista, FL, USA, 14–16 December 1994; pp. 1735–1740. [Google Scholar]
  5. Guardabassi, G.; Savaresi, S. Virtual reference direct design method: An off-line approach to data-based control system design. IEEE Trans. Automat. Contr. 2000, 45, 954–959. [Google Scholar] [CrossRef]
  6. Liu, G.; Hou, Z. Adaptive iterative learning fault-tolerant control for state constrained nonlinear systems with randomly varying iteration lengths. IEEE Trans. Neural. Networ. 2024, 35, 1735–1749. [Google Scholar] [CrossRef] [PubMed]
  7. Hou, Z.; Xiong, S. On model-free adaptive control and its stability analysis. IEEE Trans. Automat. Contr. 2019, 64, 4555–4569. [Google Scholar] [CrossRef]
  8. Liu, S.; Li, Z.; Ji, H.; Hou, Z.; Chen, L. Data learning-based model-free adaptive control and application to an NAO robot. Int. J. Robust Nonlinear Control 2023, 33, 2722–2747. [Google Scholar] [CrossRef]
  9. Liu, G.; Hou, Z.S. Cooperative adaptive iterative learning fault-tolerant control scheme for multiple subway trains. IEEE Trans. Cybern. 2022, 52, 1098–1111. [Google Scholar] [CrossRef]
  10. Liu, G.; Hou, Z.S. RBFNN-based adaptive iterative learning fault-tolerant control for subway trains with actuator faults and speed constraint. IEEE Trans. Syst. Man Cybern. Syst. 2021, 51, 5785–5799. [Google Scholar] [CrossRef]
  11. Hou, Z.; Jin, S. Model Free Adaptive Control: Theory and Applications; CRC Press: Boca Raton, FL, USA, 2013. [Google Scholar]
  12. Bu, X.; Hou, Z.; Zhang, H. Data-driven multiagent systems consensus tracking using model free adaptive control. IEEE Trans. Neural. Networ. 2018, 29, 1514–1524. [Google Scholar] [CrossRef]
  13. Bu, X.; Yu, W.; Yu, Q.; Hou, Z.; Yang, J. Event-Triggered Model-Free Adaptive Iterative Learning Control for a Class of Nonlinear Systems Over Fading Channels. IEEE Trans. Cybern. 2022, 52, 9597–9608. [Google Scholar] [CrossRef] [PubMed]
  14. Zhu, P.; Jin, S.; Bu, X.; Hou, Z.; Yin, C. Model-free adaptive control for a class of MIMO nonlinear cyberphysical systems under false data injection attacks. IEEE Trans Control Netw Syst. 2023, 10, 467–478. [Google Scholar] [CrossRef]
  15. Zheng, J.; Hou, Z. ESO-Based Model-Free Adaptive Iterative Learning Energy-Efficient Control for Subway Train with Disturbances and Over-Speed Protection. IEEE Trans. Intell. Transp. Syst. 2023, 24, 8136–8148. [Google Scholar] [CrossRef]
  16. Liu, S.; Hou, Z.; Tian, T.; Deng, Z.; Guo, L. Path tracking control of a self-driving wheel excavator via an enhanced data-driven model-free adaptive control approach. IET Control Theory Appl. 2020, 14, 220–232. [Google Scholar] [CrossRef]
  17. Han, T.; Zhu, H.; Yu, D. Data-Driven Model Predictive Control for Uncalibrated Visual Servoing. Symmetry 2024, 16, 48. [Google Scholar] [CrossRef]
  18. Jin, S.; Hou, Z.; Chi, R.; Bu, X. Model free adaptive predictive control approach for phase splits of urban traffic network. In Proceedings of the 2016 Chinese Control and Decision Conference (CCDC), Yinchuan, China, 28–30 May 2016; pp. 5750–5754. [Google Scholar]
  19. Guo, Y.; Hou, Z.; Liu, S.; Jin, S. Data-driven model-free adaptive predictive control for a class of MIMO nonlinear discrete-time systems with stability analysis. IEEE Access 2019, 7, 102852–102866. [Google Scholar] [CrossRef]
  20. Hespanha, J.; Naghshtabrizi, P.; Xu, Y. A Survey of Recent Results in Networked Control Systems. Proc. IEEE 2007, 95, 138–162. [Google Scholar] [CrossRef]
  21. Li, H.; Sun, Z.; Sun, F. Networked control systems: An overview of state-of-the-art and the prospect in future research. Control Theory Appl. 2010, 27, 238–243. [Google Scholar]
  22. Zhang, X.M.; Han, Q.L.; Yu, X. Survey on Recent Advances in Networked Control Systems. IEEE Trans. Ind. Inform. 2016, 12, 1740–1752. [Google Scholar] [CrossRef]
  23. Schlotterbeck, C.; Gallegos, J.A.; Teel, A.R.; Núñez, F. Stability guarantees for a class of networked control systems subject to stochastic delays. IEEE Trans. Automat. Contr. 2024, 69, 8884–8891. [Google Scholar] [CrossRef]
  24. Zhang, W.-A.; Yu, L. Modeling and control of networked control systems with both network-induced delay and packet-dropout. Automatica 2008, 44, 3206–3210. [Google Scholar] [CrossRef]
  25. Li, T.; Xie, L. Distributed Coordination of Multi-Agent Systems with Quantized-Observer Based Encoding-Decoding. IEEE Trans. Automat. Contr. 2012, 57, 3023–3037. [Google Scholar] [CrossRef]
  26. Jiang, K.; Mao, L.; Su, Y.; Zheng, Y. Trajectory Tracking Control for Underactuated USV with Prescribed Performance and Input Quantization. Symmetry 2021, 13, 2208. [Google Scholar] [CrossRef]
  27. Wang, J. Quantized Feedback Control of Discrete-Time MIMO Linear Systems with Input and Output Quantization Over Finite Data Rate Channels. IEEE Trans. Automat. Contr. 2023, 68, 6277–6284. [Google Scholar] [CrossRef]
  28. Bu, X.; Cheng, Z.; Hou, Z. Iterative learning control for discrete-time systems with quantised measurements. IET Control Theory Appl. 2015, 9, 1455–1460. [Google Scholar] [CrossRef]
  29. Shen, D.; Zhang, C. Zero-error tracking control under unified quantized iterative learning framework via encoding–decoding method. IEEE Trans. Cybern. 2022, 52, 1979–1991. [Google Scholar] [CrossRef] [PubMed]
  30. Bu, X.; Qiao, Y.; Hou, Z.; Yang, J. Model Free Adaptive Control for a Class of Nonlinear Systems Using Quantized Information. Asian J. Control 2018, 20, 962–968. [Google Scholar] [CrossRef]
  31. Zhu, P.; Bu, X.; Liang, J.; Shen, D. Data driven control for a class of nonlinear SISO systems with uniform quantizer using encoding and decoding mechanism. In Proceedings of the 2019 IEEE 8th Data Driven Control and Learning Systems Conference (DDCLS), Dali, China, 24–27 May 2019; pp. 7–12. [Google Scholar]
  32. Liu, G.; Hou, Z. Quantized data driven model-free adaptive predictive control for a class of nonlinear systems. In Proceedings of the 2023 IEEE 12th Data Driven Control and Learning Systems Conference (DDCLS), Xiangtan, China, 12–14 May 2023; pp. 1105–1110. [Google Scholar]
  33. Ren, H.; Liu, R.; Cheng, Z.; Ma, H.; Li, H. Data-Driven Event-Triggered Control for Nonlinear Multi-Agent Systems with Uniform Quantization. IEEE Trans. Circuits Syst. II Express Briefs 2024, 71, 712–716. [Google Scholar] [CrossRef]
  34. Ma, Y.; Che, W.; Deng, C.; Wu, Z. Distributed Model-Free Adaptive Control for Learning Nonlinear MASs Under DoS Attacks. IEEE Trans. Neural. Networ. 2023, 34, 1146–1155. [Google Scholar] [CrossRef]
  35. Wan, K.; Chen, Y.; Zhao, J.; Yu, M. Event-triggered secure consensus control for DC microgrids under DoS attacks. IEEE Trans. Ind. Electron. 2024, 72, 908–918. [Google Scholar] [CrossRef]
  36. Tan, C.; Di, J.; Guo, G.; Li, Y.; Wong, W.S. Exponential mean-square stabilization control for cyber-physical systems under random DoS attacks and transmission delay. IEEE Trans. Automat. Contr. 2024, 70, 190–202. [Google Scholar] [CrossRef]
  37. Xu, X.; Luo, H.; Chen, W.; Gao, L. Containment Control Problem of Linear Multiagent Systems with External Disturbance and DoS Attacks. Symmetry 2023, 15, 384. [Google Scholar] [CrossRef]
  38. Zhao, N.; Shi, P.; Xing, W.; Lim, C.P. Event-triggered control for networked systems under denial of service attacks and applications. IEEE Trans. Circuits Syst. I Reg. Papers 2022, 69, 811–820. [Google Scholar] [CrossRef]
  39. Li, Y.; Lu, G.; Li, K. Fuzzy adaptive event-triggered consensus control for nonlinear multiagent systems with output constraints and DoS attacks. IEEE Trans. Cybern. 2024, 55, 2–13. [Google Scholar] [CrossRef]
  40. Tan, W.; Hou, Z.; Li, Y.X. Robust data-driven iterative learning control for high-speed train with aperiodic DoS attacks and communication delays. IEEE Trans. Intell. Vehicl. 2024, 1–10. [Google Scholar] [CrossRef]
  41. Bu, X.; Yu, W.; Yin, Y.; Hou, Z. Event-triggered data-driven control for nonlinear systems under frequency-duration-constrained DoS attacks. IEEE Trans. Inf. Forensic. Secur. 2023, 18, 1449–1460. [Google Scholar] [CrossRef]
  42. Hou, Z.; Jin, S. A novel data-driven control approach for a class of discrete-time nonlinear systems. IEEE Trans. Contr. Syst. Technol. 2011, 19, 1549–1558. [Google Scholar]
  43. Zhu, P.; Jin, S.; Bu, X.; Hou, Z. Improved model-free adaptive control for MIMO nonlinear systems with event-triggered transmission scheme and quantization. IEEE Trans. Cybern. 2023, 53, 5867–5880. [Google Scholar] [CrossRef]
  44. Huo, N.; Shen, D. Encoding–decoding mechanism-based finite-level quantized iterative learning control with random data dropouts. IEEE Trans. Autom. Sci. Eng. 2020, 17, 1343–1360. [Google Scholar] [CrossRef]
  45. Bu, X.; Zhu, P.; Yu, Q.; Hou, Z.; Liang, J. Model-free adaptive control for a class of nonlinear systems with uniform quantizer. Int. J. Robust Nonlinear Control 2020, 30, 6383–6398. [Google Scholar] [CrossRef]
Figure 1. Block diagram of IMFAPC under DoS attacks.
Figure 1. Block diagram of IMFAPC under DoS attacks.
Symmetry 17 00471 g001
Figure 2. DoS attacks.
Figure 2. DoS attacks.
Symmetry 17 00471 g002
Figure 3. Output tracking performance.
Figure 3. Output tracking performance.
Symmetry 17 00471 g003
Figure 4. Control input.
Figure 4. Control input.
Symmetry 17 00471 g004
Figure 5. Tracking error.
Figure 5. Tracking error.
Symmetry 17 00471 g005
Figure 6. Disturbance signal.
Figure 6. Disturbance signal.
Symmetry 17 00471 g006
Figure 7. DoS attacks under disturbance.
Figure 7. DoS attacks under disturbance.
Symmetry 17 00471 g007
Figure 8. Tracking performance with disturbance.
Figure 8. Tracking performance with disturbance.
Symmetry 17 00471 g008
Figure 9. Control input with disturbance.
Figure 9. Control input with disturbance.
Symmetry 17 00471 g009
Figure 10. Tracking error with disturbance.
Figure 10. Tracking error with disturbance.
Symmetry 17 00471 g010
Table 1. Comparison of different algorithms without disturbance.
Table 1. Comparison of different algorithms without disturbance.
Control AlgorithmMean Tracking Error
IMFAPC0.0002
QDDMFAPC0.0025
Table 2. Comparison of different algorithms with disturbance.
Table 2. Comparison of different algorithms with disturbance.
Control AlgorithmMean Tracking Error
IMFAPC0.0004
QDDMFAPC0.0016
Table 3. Abbreviations/primary notations.
Table 3. Abbreviations/primary notations.
Abbreviations/NotationsThe Meaning of Abbreviations/Notations
DoSdenial of service
DDCdata-driven control
MFAC model-free adaptive control
MFAILCmodel-free adaptive iterative learning control
MFAPCmodel-free adaptive predictive control
MIMOmultiple input multiple output
NCSnetwork control system
ILCiterative learning control
IMFAPCimproved model-free adaptive predictive control
QDDMFAPCquantized data driven model-free adaptive predictive control
ttime
γ ( t ) R system output
γ D o S ( t ) system output under DoS attacks
u ( k ) R system input
γ * ( t ) reference trajectory
φ ( t ) R time varying parameter of the system
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Liu, G.; Zhu, J.; Wang, Y.; Wang, Y. Improved Model-Free Adaptive Predictive Control for Nonlinear Systems with Quantization Under Denial of Service Attacks. Symmetry 2025, 17, 471. https://doi.org/10.3390/sym17030471

AMA Style

Liu G, Zhu J, Wang Y, Wang Y. Improved Model-Free Adaptive Predictive Control for Nonlinear Systems with Quantization Under Denial of Service Attacks. Symmetry. 2025; 17(3):471. https://doi.org/10.3390/sym17030471

Chicago/Turabian Style

Liu, Genfeng, Jinbao Zhu, Yule Wang, and Yangyang Wang. 2025. "Improved Model-Free Adaptive Predictive Control for Nonlinear Systems with Quantization Under Denial of Service Attacks" Symmetry 17, no. 3: 471. https://doi.org/10.3390/sym17030471

APA Style

Liu, G., Zhu, J., Wang, Y., & Wang, Y. (2025). Improved Model-Free Adaptive Predictive Control for Nonlinear Systems with Quantization Under Denial of Service Attacks. Symmetry, 17(3), 471. https://doi.org/10.3390/sym17030471

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop