Next Article in Journal
Uniqueness of Solution for Impulsive Evolution Equation in Ordered Banach Spaces
Previous Article in Journal
An Upper Bound for the Weight of the Fine Uniformity
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Observer-Based Exponential Stability Control of T-S Fuzzy Networked Systems with Varying Communication Delays

1
School of Mathematics and Statistics, Anyang Normal University, Anyang 455000, China
2
School of Automation, Nanjing Institute of Technology, Nanjing 211167, China
*
Author to whom correspondence should be addressed.
Mathematics 2025, 13(15), 2513; https://doi.org/10.3390/math13152513
Submission received: 23 June 2025 / Revised: 22 July 2025 / Accepted: 29 July 2025 / Published: 5 August 2025

Abstract

This paper is concerned with the problem of dynamic output feedback exponential stability control of T-S fuzzy networked control systems (NCSs) with varying communication delays. First, with consideration of varying communication delays, a new model of the networked systems is established by using the T-S fuzzy method, and a state observer is designed to estimate the unknown control disturbance. Then, a delay-dependent exponential stability criterion of closed-loop systems is derived by means of iterative technique and multiple augmented Lyapnov functionals and the linear matrix inequality (LMI) method. Furthermore, an observer-based controller is explicitly constructed to realize exponential stability control for this class of NCSs. An iterative algorithm is developed to compute the controller’s matrix by means of the Cone Complementarity Linearization Method (CCLM). Lastly, the validity and feasibility of the proposed exponential stability criterion are confirmed via a numerical simulation example.

1. Introduction

Networked control systems (NCSs) are network-based feedback control systems that utilize network technology to connect dispersed devices, sensors, and actuators, enabling information exchange as well as greatly improving the automation and intelligence level of the systems. Since its proposal at the end of the 20th century, NCSs have attracted widespread attention from both academia and industry [1,2,3]. Compared with traditional control systems, NCSs have advantages such as flexible structure, easy scalability, and resource sharing, providing new ideas and methods for the design, implementation, and maintenance of the control systems. However, the research on NCSs also faces some challenges, such as the introduction of networks, which make it difficult to avoid latency and packet loss issues. These problems may lead to a decrease in controller performance and even instability.
In recent years, with the rapid development of control, network, and communication technologies, NCSs have gradually become a hot research topic [4,5,6]. The research content covers multiple aspects such as modeling, time delay, stability analysis, disturbance handling, controller design, and performance evaluation. In terms of modeling, researchers are committed to establishing more accurate NCS models to better describe the dynamic behavior of the systems. These models help us to understand the operating mechanism of the systems and provide a foundation for subsequent control.
Time delay and stability are key issues in NCSs. Researchers have conducted extensive research on time delay compensation, stability analysis, and other aspects to improve the robustness and stability of the systems. Disturbance handling is also one of the important directions in the research of NCSs. In practical applications, the systems are often affected by various external disturbances, such as noise, interference, etc. In order to improve the anti-interference ability of the systems, researchers have conducted in-depth research on disturbance suppression, filtering algorithms, and other aspects. In addition, network predictor design, traffic optimization, controller design, and scheduling are also hot topics in the research of NCSs. In summary, the research status of NCSs shows a trend of diversification and deepening, covering multiple key issues and research directions. With the continuous advancement of technology and the expansion of application fields, research on NCSs will continue to deepen, providing more efficient and intelligent control solutions for fields such as industrial automation and intelligent transportation [7,8]. Kundu et al. studied the allocation of communication resources in networked control systems. A method for finding periodic scheduling strategies has been proposed, under which the global asymptotic stability of each system in NCSs is maintained. A stable scheduling strategy is built by using loops that satisfy appropriate contractility conditions on the underlying weighted directed graph of NCSs [9]. An improved algorithm has been proposed to accelerate the convergence speed of the network systems. By using smaller initial values and faster decay rates, a more accurate upper limit of the system states can be obtained. The effectiveness of the improvement was demonstrated through simulation [10]. The finite-time stabilization problem of a class of discrete-time networked control systems with network-induced delay, as well as packet loss in feedback and forward channels, was studied. A new finite-time state feedback and output feedback stable controller is proposed using predictive control methods, and compensation is made for time delay and packet loss. A sufficient condition for finite-time stabilization is given for a given discrete-time networked control system [11]. Chen et al. studies the delay-dependent state feedback control problem of a class of networked control systems with nonlinear disturbances and two delay components. Based on the dynamic delay interval method and Wirdinger integral inequality, some improved delay-dependent stability analyses have been obtained. Subsequently, the results were extended to NCSs with time delay, and the corresponding stability analysis results and state feedback controllers were obtained [12].
Fuzzy systems are intelligent control systems based on fuzzy mathematics theory, which uses language rules and fuzzy logic reasoning to make decisions. Fuzzy systems have been widely applied in various industries and practical applications [13,14,15,16,17]. In the industrial field, fuzzy control is applied in various aspects such as industrial furnaces, petrochemical processes, robot systems, etc. The advantages of fuzzy control systems are that they do not require the establishment of an accurate mathematical model of the controlled object, have simple designs, are easy to implement, and have strong robustness. However, fuzzy systems also have some drawbacks, such as simple fuzzy processing of information, which may lead to a decrease in control accuracy and a deterioration in dynamic quality of the systems. The design of fuzzy control still lacks systematicity, making it difficult to effectively control complex systems. Li et al. studied the defense control problem of T-S fuzzy systems with multiple transmission channels for sampled data against asynchronous denial-of-service (DoS) attacks. A new exchange security control method has been proposed to tolerate asynchronous DoS attacks that act independently on each channel. In addition, by applying the segmented Lyapunov function method, the sufficient conditions dependent on the membership function were derived to ensure the exponential stability of the systems [18]. The robust fuzzy control problem of the nonlinear systems with actuator saturation limitation was studied. By using T-S fuzzy description, a fuzzy observer is established based on the sampled output affected by the network-induced delay. The saturation fuzzy control law is derived from the estimated states of the observer [19]. Zheng et al. studied the dynamic output feedback and H∞ stability analysis of a class of uncertain networked control systems with multiple time delays and external disturbances. A delay-dependent Lyapunov functional with double-product sub-items was designed, and the stability conditions in the form of LMI were obtained to ensure asymptotic stability of the closed-loop systems under the specified H∞ performance [20].
T-S fuzzy logic systems is the abbreviation of Takagi–Sugeno fuzzy logic systems, which quantifies the consequent of each fuzzy rule in pure fuzzy logic systems [21,22,23,24]. The T-S fuzzy model is an effective tool for describing nonlinear systems, which represents the dynamic characteristics of the entire system by dividing the system into a set of local models and applying a set of linear feedback control laws in each local model. This method is particularly suitable for NCSs and can effectively solve the stability problem of nonlinear systems [25,26,27,28,29]. Pan et al. investigated the design problem of a security controller based on resilient event-triggering for a nonlinear NCSs described by interval type-2 fuzzy model under non-periodic denial-of-service attacks. A resilient event-triggering strategy based on uncertain event-triggered variables is proposed for nonlinear NCSs. This strategy can transmit necessary data packets to the controller in unexpected situations [30]. Aslam1 et al. investigated the output tracking control problem of a class of T-S fuzzy nonlinear network control systems. A strategy based on event-triggered scheme is proposed to reduce bandwidth utilization in NCSs by utilizing inherent constraints, including communication latency and data transmission limitations. On this basis, a synchronous behavior-based operation model is proposed to make the design of linear controllers easier to implement [31].
However, the above research has mainly focused on the asymptotic stability and control design of fuzzy network systems, while research on exponential stability and dynamic output feedback control is relatively rare. This article is based on previous research and focuses on a class of T-S fuzzy NCSs with time-varying delays. By constructing a new Lyapunov functional and using linear matrix inequality tools to design an exponential stable state observer for the systems, the sufficient conditions for the simultaneous exponential stability of the closed-loop systems and error systems are obtained. The design strategy of the exponential stable controller is given by using the observation data.

2. Preliminaries

Consider the following fuzzy NCSs with varying communication delays given in Figure 1 with the following state delay plant:
Rule i :
If z 1 ( t ) is M 1 i and z 2 ( t ) is M 2 i , and z n ( t ) is M n i ,
Then x ˙ ( t ) = A i x ( t ) + A d i x ( t d ( t ) ) + B i u ( t ) ,
y ( t ) = C i x ( t ) ,   i = 1 , 2 , , q ,
x ( t ) = ϕ ( t ) ,   t [ d ¯ , 0 ] ,
where z ( t ) = [ z 1 ( t )   z 2 ( t ) z n ( t ) ] T is the premise variable, x ( t ) R n is the state, q is the number of fuzzy rules, M k i ( i = 1 , 2 , , q   ; k = 1 , 2 , , n ) are the fuzzy sets, u ( t ) R m is the control input, y ( t ) R l is the controlled output, A i , A d i R n × n , B i R n × m , and C i R l × n are a set of known real matrices. ϕ ( t ) = [ ϕ 1 ( t )   ϕ 2 ( t ) ϕ n ( t ) ] T   R n is the initial condition of the state. d ( t ) is the varying state delay.
Figure 1. A typical networked control system.
Figure 1. A typical networked control system.
Mathematics 13 02513 g001
In Figure 1, τ s c ( t ) and τ c a ( t ) are the sensor–controller delay and controller–actuator delay, respectively. Then the communication delay is given by τ ( t ) = τ s c ( t ) + τ c a ( t ) .
Assumption 1.
Only the output of the systems is available.
Assumption 2.
d ( t )   and   τ ( t )   are time-varying under the following bounded condition.
d ( t ) d ¯ ,   d ¯ > 0 ,   d ˙ ( t ) d ,   d [ 0.1 ) ,   τ ( t ) τ ¯ , τ ¯ > 0 , τ ˙ ( t ) τ , τ [ 0.1 )
Using single-point fuzzification, a product inference engine, and the central fuzzy elimination method, the global fuzzy model of the systems (1) can be described as
x ˙ ( t ) = i = 1 q μ i ( z ( t ) ) [ A i x ( t ) + A d i x ( t d ( t ) ) + B i u ( t τ ( t ) ) ] , y ( t ) = i = 1 q μ i ( z ( t ) ) C i x ( t ) , x ( t ) = ϕ ( t ) ,                                             t [ d ^ , 0 ] ,
where
ω i ( z ( t ) ) = k = 1 n M k i ( z k ( t ) ) ,   μ i ( z ( t ) ) = ω i ( z ( t ) ) i = 1 q ω i ( z ( t ) ) ,   d ^ = max { d ¯ , τ ¯ } .
where   M k i ( z k ( t ) )   is the membership degree of   z k ( t )   corresponding to   M k i   , and   ω i ( z ( t ) )   satisfies
ω i ( z ( t ) ) 0 ,   i = 1 q ω i ( z ( t ) ) > 0 ,   i = 1 , 2 , , q .
And we define
| | ϕ ( t ) | | d ^ = S u p t [ d ^ , 0 ] i = 1 , 2 , , n | | ϕ i ( t ) | | .
In this paper, the following fuzzy observer of the systems (2) is designed
x ^ ˙ ( t ) = i = 1 q μ i ( z ( t ) ) { A i x ^ ( t ) + A d i x ^ ( t d ( t ) ) + B i u ( t τ ( t ) ) + L i [ y ( t ) y ^ ( t ) ] } , y ^ ( t ) = i = 1 q μ i ( z ( t ) ) C i x ^ ( t ) , x ^ ( t ) = ψ ( t ) ,                 t [ d ^   0 ] .
where  x ^ ( t ) is the state of the observer, and   L i  is a set of constant matrices to be determined.
The observer error is defined as
e ( t ) = x ( t ) x ^ ( t ) .
With (2)–(4), the error systems can be obtained as
e ˙ ( t ) = i = 1 q j = 1 q μ i ( z ( t ) ) μ j ( z ( t ) ) [ ( A i L i C j ) e ( t ) + A d i e ( t d ( t ) ) ] , e ( t ) = η ( t ) ,            t [ d ^ , 0 ] ,
where  η ( t ) = φ ( t ) ψ ( t ) .
And then, a fuzzy controller based on the above observer is designed as
u ( t ) = i = 1 q μ i ( z ( t ) ) K i x ^ ( t ) .
Using Equations (2), (4) and (6), the resultant closed-loop systems can be written as
x ˙ ( t ) = i = 1 q j = 1 q μ i ( z ( t ) ) μ j ( z ( t ) ) [ A i x ( t ) + A d i x ( t d ( t ) ) + B i K j x ( t τ ( t ) ) B i K j e ( t τ ( t ) ) ] , x ( t ) = ϕ ( t ) ,                                         t [ d ^ , 0 ] .
Before establishing our main results, the following basic definition and Lemma are given.
Definition 1
([7]). For the systems (2), if there exist constants α > 0  and γ 1  such that
| | x ( t ) | | γ | | ϕ ( t ) | | d ^ e α t ,   t 0 ,
the systems (2) are exponentially stable.
Lemma 1
([8]). The linear matrix inequality
Y ( x ) W ( x ) * R ( x ) > 0
is equivalent to
R ( x ) > 0 ,   Y ( x ) W ( x ) R 1 ( x ) W T ( x ) > 0 ,
where the matrices   Y ( x ) = Y T ( x ) , R ( x ) = R T ( x )   depend on  x .
Remark 1.
By taking the delay from sensor to controller and control to actuator as the control input delay, the fuzzy mathematical model of the network systems with varying delays is established using T-S fuzzy method. This model is more convenient to apply to practical networked control systems, such as networked industrial robot systems, industrial transmission systems, etc. The determination of the designed observer only requires the determination of coefficient matrices L i .

3. Results

In this section, sufficient conditions for exponential stability of the error systems (5) and the closed-loop systems (7) are elaborated. To address this problem, we have adopted a dynamic output feedback controller such that the error systems (5) and the closed-loop systems (7) are exponentially stable.

3.1. Design of Fuzzy Observer

Theorem 1.
The error systems (5) is exponentially stable if there exist matrices   L i R n × l , S 12 R n × n , i , j = 1 , 2 , , q  and positive-definite matrices P , Q , S , T R n × n and scalar  α > 0  such that
Ω = Ω 11 Ω 12 S 12 Ω 22 T S 12 S e 2 α d ¯ T < 0 ,
where
Ω 11 = P ( A i L i C j ) + ( A i L i C j ) T + Q + S + 2 α P + d ¯ 2 ( A i L i C j ) T T ( A i L i C j ) T , Ω 12 = P A d i + d ¯ 2 ( A i L i C j ) T T A d i + T S 12 , Ω 22 = ( 1 d ) Q e 2 α d ¯ + d ¯ 2 A d i T T A d i 2 T + S 12 + S 12 T .
Proof of Theorem 1.
Consider the Lyapunov–Krasovskii functional candidate as
V ( e ( t ) ) = e T ( t ) P e ( t ) + t d ( t ) t e T ( s ) Q e 2 α ( s t ) e ( s ) d s + t d ¯ t e T ( s ) S e 2 α ( s t ) e ( s ) d s + d ¯ d ¯ 0 t + θ t e ˙ T ( s ) T e 2 α ( s t ) e ˙ ( s ) d s d θ .
The goal is to show that if condition (8) holds, then V ˙ ( e ( t ) ) < 2 α V ( e ( t ) ) . Following the state trajectory of the systems (5), we have
V ˙ ( e ( t ) ) = i = 1 q j = 1 q μ i ( z ( t ) ) μ j ( z ( t ) ) [ 2 e T ( t ) P ( A i L i C j ) e ( t ) + 2 e T ( t ) P A d i e ( t d ( t ) ) ] + e T ( t ) Q e ( t ) ( 1 d ˙ ( t ) ) e T ( t d ( t ) ) Q e 2 α d ( t ) e ( t d ( t ) ) 2 α t d ( t ) t e T ( s ) Q e 2 α ( s t ) e ( s ) d s + e T ( t ) S e ( t ) e T ( t d ¯ ) S e 2 α d ¯ e ( t d ¯ ) 2 α t d ¯ t e T ( s ) S e 2 α ( s t ) e ( s ) d s + d ¯ 2 e ˙ T ( t ) T e ˙ ( s ) d ¯ t d ¯ t e ˙ T ( s ) T e 2 α ( s t ) e ˙ ( s ) d s 2 α d ¯ d ¯ 0 t + θ t e ˙ T ( s ) T e 2 α ( s t ) e ˙ ( s ) d s d θ + 2 α e T ( t ) P e ( t ) 2 α e T ( t ) P e ( t ) .
d ¯ t d ¯ t e ˙ T ( s ) T e 2 α ( s t ) e ˙ ( s ) d s e ( t ) e ( t d ( t ) ) e ( t d ( t ) ) e ( t d ¯ ) T T S 12 T e ( t ) e ( t d ( t ) ) e ( t d ( t ) ) e ( t d ¯ ) .
d ¯ 2 e ˙ T ( t ) T e ˙ ( s ) = d ¯ 2 i = 1 q j = 1 q μ i ( z ( t ) ) μ j ( z ( t ) ) [ e T ( t ) ( A i L i C j ) T T ( A i L i C j ) e ( t ) + 2 e T ( t ) ( A i L i C j ) T T A d i e ( t d ( t ) ) + e T ( t d ( t ) ) A d i T T A d i e ( t d ( t ) ) ] .
It can be obtained from reference [6]
i = 1 q j = 1 q μ i ( z ( t ) ) μ j ( z ( t ) ) = 1 ,
and therefore,
V ˙ ( e ( t ) ) < i = 1 q j = 1 q μ i ( z ( t ) ) μ j ( z ( t ) ) { 2 e T ( t ) P ( A i L i C j ) e ( t ) + 2 e T ( t ) P A d i e ( t d ( t ) ) + e T ( t ) Q e ( t ) ( 1 d ) e T ( t d ( t ) ) Q e 2 α d ¯ e ( t d ( t ) ) + e T ( t ) S e ( t ) e T ( t d ¯ ) S e 2 α d ¯ e ( t d ¯ ) + d ¯ 2 [ e T ( t ) ( A i L i C j ) T T ( A i L i C j ) e ( t ) + 2 e T ( t ) ( A i L i C j ) T T A d i e ( t d ( t ) ) + e T ( t d ( t ) ) A d i T T A d i e ( t d ( t ) ) ] e ( t ) e ( t d ( t ) ) e ( t d ( t ) ) e ( t d ¯ ) T T S 12 T e ( t ) e ( t d ( t ) ) e ( t d ( t ) ) e ( t d ¯ ) + 2 α e T ( t ) P e ( t ) } 2 α V ( e ( t ) ) = i = 1 q j = 1 q μ i ( z ( t ) ) μ j ( z ( t ) ) ζ T Ω ζ 2 α V ( e ( t ) ) ,
where
ζ ( t ) = e ( t ) e ( t d ( t ) ) e ( t d ¯ ) ,
Substituting the matrix inequality (8) into the above equality, we have
V ˙ ( e ( t ) ) < 2 α V ( e ( t ) ) ,
then
V ( e ( t ) ) < V ( e ( 0 ) ) e 2 α t [ λ max ( P ) + d ¯ λ max ( Q ) + d ¯ λ max ( S ) + d ¯ 2 λ max ( T ) ] | | η ( t ) | | d ^ 2 e 2 α t .
It is easy to know from the expression of V ( e ( t ) ) ,
V ( e ( t ) ) λ min ( P ) | | e ( t ) | | 2 .
From (9), (10), it yields
| | e ( t ) | | < λ max ( P ) + d ¯ λ max ( Q ) + d ¯ λ max ( S ) + d ¯ 2 λ max ( T ) λ min ( P ) | | η ( t ) | | d ^ e α t .
According to definition 1, the error systems (5) are exponentially stable. □
Remark 2.
A sufficient condition for exponential stability of the error systems (5) is given in Theorem 1.  α  is the exponential stability degree of the error systems (5). However, the sufficient condition (8) is not a linear matrix inequality and cannot be solved by the LMI toolbox in MATLAB2017.
Theorem 2.
The error systems (5) are exponentially stable if there exist matrices  L ¯ i R n × l , S 12 R n × n , i , j = 1 , 2 , , q , positive-definite matrices P , Q , S R n × n , and scalar α > 0 , such that
Σ = Σ 11 Σ 12 S 12 d ¯ ( A i T P C j T L ¯ i T ) Σ 22 P S 12 d ¯ A d i T P S e 2 α d ¯ P 0 P < 0 ,
where
Σ 11 = P A i L ¯ i C j + A i T P C j T L ¯ i T + Q + S + 2 α P P , Σ 12 = P A d i + P S 12 , Σ 22 = ( 1 d ) Q e 2 α d ¯ 2 P + S 12 + S 12 T .
The gain matrices of the fuzzy observer (7) can be obtained as  L i = P 1 L ¯ i .
Proof of Theorem 2 is omitted.

3.2. Design of Dynamic Output Feedback Fuzzy Controller

In this section, the design procedure of the controller in terms of LMIs is derived.
Theorem 3.
Under the proposed output feedback fuzzy controller (6), the error systems (5) and the closed-loop systems (7) are exponentially stable if there exist matrices   L ¯ i R n × l , S 12 , S ¯ 12 , S ^ 12 R n × n , K j R m × n , i , j = 1 , 2 , , q   and positive-definite matrices   P , Q , S , P ¯ , Q ¯ , S ¯ , R ¯ , Q ^ , S ^ , R ^ R n × n , as well as scalars   α > 0 , β > 0 , ε > 0 , thus satisfying the condition (11) and the following inequality
Θ = Θ 11 Θ 12 S ¯ 12 Θ 14 S ^ 12 Θ 22 R ¯ S ¯ 12 Θ 24 0 S ¯ e 2 β d ¯ R ¯ 0 0 Θ 44 S ^ 12 + R ^ S ^ e 2 β τ ¯ R ^ < 0 ,
where
Θ 11 = P ¯ A i + A i T P ¯ + Q ¯ + S ¯ + Q ^ + S ^ + 2 β P ¯ + ε P ¯ + d ¯ 2 A i T R ¯ A i + τ ¯ 2 A i T R ^ A i R ¯ R ^ Θ 12 = P ¯ A d i + d ¯ 2 A i T R ¯ A d i + τ ¯ 2 A i T R ^ A d i + R ¯ S ¯ 12 Θ 14 = P ¯ B i K j + d ¯ 2 A i T R ¯ B i K j + τ ¯ 2 A i T R ^ B i K j + R ^ S ^ 12 Θ 22 = ( 1 d ) Q ¯ e 2 β d ¯ + d ¯ 2 A d i T R ¯ A d i + τ ¯ 2 A d i T R ^ A d i 2 R ¯ + S ¯ 12 + S ¯ 12 T Θ 24 = d ¯ 2 A d i T R ¯ B i K j + τ ¯ 2 A d i T R ^ B i K j Θ 44 = ( 1 τ ) Q ^ e 2 β τ ¯ + d ¯ 2 K j T B i T R ¯ B i K j + τ ¯ 2 K j T B i T R ^ B i K j 2 R ^ + S ^ 12 + S ^ 12 T .
Proof of Theorem 3.
Consider the Lyapunov–Krasovskii functional candidate as
V ( x ( t ) ) = x T ( t ) P ¯ x ( t ) + t d ( t ) t x T ( s ) Q ¯ e 2 β ( s t ) x ( s ) d s + t d ¯ t x T ( s ) S ¯ e 2 β ( s t ) x ( s ) d s + d ¯ d ¯ 0 t + θ t x ˙ T ( s ) R ¯ e 2 β ( s t ) x ˙ ( s ) d s d θ + t τ ( t ) t x T ( s ) Q ^ e 2 β ( s t ) x ( s ) d s + t τ ¯ t x T ( s ) S ^ e 2 β ( s t ) x ( s ) d s + τ ¯ τ ¯ 0 t + θ t x ˙ T ( s ) R ^ e 2 β ( s t ) x ˙ ( s ) d s d θ .
Following the state trajectory of the closed-loop systems (7), we obtain
V ˙ ( x ( t ) ) = i = 1 q j = 1 q μ i ( z ( t ) ) μ j ( z ( t ) ) [ 2 x T ( t ) P ¯ A i x ( t ) + 2 x T ( t ) P ¯ A d i x ( t d ( t ) ) + 2 x T ( t ) P ¯ B i K j x ( t τ ( t ) ) 2 x T ( t ) P ¯ B i K j e ( t τ ( t ) ) ] + x T ( t ) Q ¯ x ( t ) ( 1 d ˙ ( t ) ) x T ( t d ( t ) ) Q ¯ e 2 β d ( t ) x ( t d ( t ) ) 2 β t d ( t ) t x T ( s ) Q ¯ e 2 β ( s t ) x ( s ) d s + x T ( t ) S ¯ x ( t ) x T ( t d ¯ ) S ¯ e 2 β d ¯ x ( t d ¯ ) 2 β t d ¯ t x T ( s ) S ¯ e 2 β ( s t ) x ( s ) d s + d ¯ 2 x ˙ T ( t ) R ¯ x ˙ ( t ) d ¯ t d ¯ t x ˙ T ( s ) R ¯ e 2 β ( s t ) x ˙ ( s ) d s 2 β d ¯ d ¯ 0 t + θ t x ˙ T ( s ) R ¯ e 2 β ( s t ) x ˙ ( s ) d s d θ + x T ( t ) Q ^ x ( t ) ( 1 τ ˙ ( t ) ) x T ( t τ ( t ) ) Q ^ e 2 β τ ( t ) x ( t τ ( t ) ) 2 β t τ ( t ) t x T ( s ) Q ^ e 2 β ( s t ) x ( s ) d s + x T ( t ) S ^ x ( t ) x T ( t τ ¯ ) S ^ e 2 β τ ¯ x ( t τ ¯ ) 2 β t τ ¯ t x T ( s ) S ^ e 2 β ( s t ) x ( s ) d s + τ ¯ 2 x ˙ T ( t ) R ^ x ˙ ( t ) τ ¯ t τ ¯ t x ˙ T ( s ) R ^ e 2 β ( s t ) x ˙ ( s ) d s 2 β τ ¯ τ ¯ 0 t + θ t x ˙ T ( s ) R ^ e 2 β ( s t ) x ˙ ( s ) d s d θ + 2 β x T ( t ) P ¯ x ( t ) 2 β x T ( t ) P ¯ x ( t ) i = 1 q j = 1 q μ i ( z ( t ) ) μ j ( z ( t ) ) [ 2 x T ( t ) P ¯ A i x ( t ) + 2 x T ( t ) P ¯ A d i x ( t d ( t ) ) + 2 x T ( t ) P ¯ B i K j x ( t τ ( t ) ) 2 x T ( t ) P ¯ B i K j e ( t τ ( t ) ) ] + x T ( t ) Q ¯ x ( t ) ( 1 d ) x T ( t d ( t ) ) Q ¯ e 2 β d ¯ x ( t d ( t ) ) + x T ( t ) S ¯ x ( t ) x T ( t d ¯ ) S ¯ e 2 β d ¯ x ( t d ¯ ) + d ¯ 2 x ˙ T ( t ) R ¯ x ˙ ( t ) d ¯ t d ¯ t x ˙ T ( s ) R ¯ e 2 β ( s t ) x ˙ ( s ) d s + x T ( t ) Q ^ x ( t ) ( 1 τ ) x T ( t τ ( t ) ) Q ^ e 2 β τ ¯ x ( t τ ( t ) ) + x T ( t ) S ^ x ( t ) x T ( t τ ¯ ) S ^ e 2 β τ ¯ x ( t τ ¯ ) + τ ¯ 2 x ˙ T ( t ) R ^ x ˙ ( t ) τ ¯ t τ ¯ t x ˙ T ( s ) R ^ e 2 β ( s t ) x ˙ ( s ) d s + 2 β x T ( t ) P ¯ x ( t ) 2 β V ( x ( t ) ) ,
d ¯ t d ¯ t x ˙ T ( s ) R ¯ e 2 β ( s t ) x ˙ ( s ) d s x ( t ) x ( t d ( t ) ) x ( t d ( t ) ) x ( t d ¯ ) T R ¯ S ¯ 12 R ¯ x ( t ) x ( t d ( t ) ) x ( t d ( t ) ) x ( t d ¯ ) . τ ¯ t τ ¯ t x ˙ T ( s ) R ^ e 2 β ( s t ) x ˙ ( s ) d s x ( t ) x ( t τ ( t ) ) x ( t τ ( t ) ) x ( t τ ¯ ) T R ^ S ^ 12 R ^ x ( t ) x ( t τ ( t ) ) x ( t τ ( t ) ) x ( t τ ¯ ) . d ¯ 2 x ˙ T ( t ) R ¯ x ˙ ( s ) = d ¯ 2 i = 1 q j = 1 q μ i ( z ( t ) ) μ j ( z ( t ) ) [ x T ( t ) A i T R ¯ A i x ( t ) + 2 x T ( t ) A i T R ¯ A d i x ( t d ( t ) ) + 2 x T ( t ) A i T R ¯ B i K j x ( t τ ( t ) ) 2 x T ( t ) A i T R ¯ B i K j e ( t τ ( t ) ) + x T ( t d ( t ) ) A d i T R ¯ A d i x ( t d ( t ) ) + 2 x T ( t d ( t ) ) A d i T R ¯ B i K j x ( t τ ( t ) ) 2 x T ( t d ( t ) ) A d i T R ¯ B i K j e ( t τ ( t ) ) + x T ( t τ ( t ) ) K j T B i T R ¯ B i K j x ( t τ ( t ) ) 2 x T ( t τ ( t ) ) K j T B i T R ¯ B i K j e ( t τ ( t ) ) + e T ( t τ ( t ) ) K j T B i T R ¯ B i K j e ( t τ ( t ) ) ] .
τ ¯ 2 x ˙ T ( t ) R ^ x ˙ ( s ) = τ ¯ 2 i = 1 q j = 1 q μ i ( z ( t ) ) μ j ( z ( t ) ) [ x T ( t ) A i T R ^ A i x ( t ) + 2 x T ( t ) A i T R ^ A d i x ( t d ( t ) ) + 2 x T ( t ) A i T R ^ B i K j x ( t τ ( t ) ) 2 x T ( t ) A i T R ^ B i K j e ( t τ ( t ) ) + x T ( t d ( t ) ) A d i T R ^ A d i x ( t d ( t ) ) + 2 x T ( t d ( t ) ) A d i T R ^ B i K j x ( t τ ( t ) ) 2 x T ( t d ( t ) ) A d i T R ^ B i K j e ( t τ ( t ) ) + x T ( t τ ( t ) ) K j T B i T R ^ B i K j x ( t τ ( t ) ) 2 x T ( t τ ( t ) ) K j T B i T R ^ B i K j e ( t τ ( t ) ) + e T ( t τ ( t ) ) K j T B i T R ^ B i K j e ( t τ ( t ) ) ] .
Therefore,
V ˙ ( x ( t ) ) i = 1 q j = 1 q μ i ( z ( t ) ) μ j ( z ( t ) ) [ ξ T ( t ) Θ ξ ( t ) 2 x T ( t ) P ¯ B i K j e ( t τ ( t ) ) 2 x T ( t ) A i T R ¯ B i K j e ( t τ ( t ) ) 2 x T ( t d ( t ) ) A d i T R ¯ B i K j e ( t τ ( t ) ) 2 x T ( t τ ( t ) ) K j T B i T R ¯ B i K j e ( t τ ( t ) ) + e T ( t τ ( t ) ) K j T B i T R ¯ B i K j e ( t τ ( t ) ) 2 x T ( t ) A i T R ^ B i K j e ( t τ ( t ) ) 2 x T ( t d ( t ) ) A d i T R ^ B i K j e ( t τ ( t ) ) 2 x T ( t τ ( t ) ) K j T B i T R ^ B i K j e ( t τ ( t ) ) + e T ( t τ ( t ) ) K j T B i T R ^ B i K j e ( t τ ( t ) ) ε x T ( t ) P ¯ x ( t ) 2 β V ( x ( t ) ) ] < i = 1 q j = 1 q μ i ( z ( t ) ) μ j ( z ( t ) ) [ ξ T ( t ) Θ ξ ( t ) ε x T ( t ) P ¯ x ( t ) + e T ( t τ ( t ) ) K j T B i T R ¯ B i K j e ( t τ ( t ) ) + e T ( t τ ( t ) ) K j T B i T R ^ B i K j e ( t τ ( t ) ) 2 β V ( x ( t ) ) ] ,
where ε > 0 is a scalar, and
ξ ( t ) = x ( t ) x ( t d ( t ) ) x ( t d ¯ ) x ( t τ ( t ) ) x ( t τ ¯ )
If the matrix inequality (12) holds, the above inequality can be changed as
V ˙ ( x ( t ) ) < ε x T ( t ) P ¯ x ( t ) + i = 1 q j = 1 q μ i ( z ( t ) ) μ j ( z ( t ) ) [ e T ( t τ ( t ) ) K j T B i T R ¯ B i K j e ( t τ ( t ) ) + e T ( t τ ( t ) ) K j T B i T R ^ B i K j e ( t τ ( t ) ) ] 2 β V ( x ( t ) ) ε λ min ( P ¯ ) | | x ( t ) | | 2 + i = 1 q j = 1 q μ i ( z ( t ) ) μ j ( z ( t ) ) | | K j T B i T ( R ¯ + R ^ ) B i K j | | | | e ( t τ ( t ) ) | | 2 2 β V ( x ( t ) ) = ( ε λ min ( P ¯ ) | | x ( t ) | | 2 i = 1 q j = 1 q μ i ( z ( t ) ) μ j ( z ( t ) ) | | K j T B i T ( R ¯ + R ^ ) B i K j | | | | e ( t τ ( t ) ) | | 2 ) 2 β V ( x ( t ) ) ,
When ε λ min ( P ¯ ) | | x ( t ) | | 2   i = 1 q j = 1 q μ i ( z ( t ) ) μ j ( z ( t ) ) | | K j T B i T ( R ¯ + R ^ ) B i K j | | | | e ( t τ ( t ) ) | | 2 0 , we have
| | x ( t ) | | i = 1 q j = 1 q μ i ( z ( t ) ) μ j ( z ( t ) ) | | K j T B i T ( R ¯ + R ^ ) B i K j | | ε λ min ( P ¯ ) | | e ( t τ ( t ) ) | | .
According to Theorem 2, when matrix inequality (11) holds, the error systems (5) are exponentially stable, that is, the error e ( t ) is exponentially stable, and the state x ( t ) of the closed-loop systems (7) is also exponentially stable according to inequality (14).
When ε λ min ( P ¯ ) | | x ( t ) | | 2   i = 1 q j = 1 q μ i ( z ( t ) ) μ j ( z ( t ) ) | | K j T B i T ( R ¯ + R ^ ) B i K j | | | | e ( t τ ( t ) ) | | 2 > 0 , the inequality (13) can be changed as
V ˙ ( x ( t ) ) < 2 β V ( x ( t ) ) ,
and therefore,
V ( x ( t ) ) < V ( x ( 0 ) ) e 2 β t [ λ max ( P ¯ ) + d ¯ λ max ( Q ¯ ) + d ¯ λ max ( S ¯ ) + d ¯ 2 λ max ( R ¯ ) + τ ¯ λ max ( Q ^ ) + τ ¯ λ max ( S ^ ) + τ ¯ 2 λ max ( R ^ ) ] | | ϕ | | d ^ 2 e 2 β t .
It is easy to know from the expression of V ( x ( t ) ) that
V ( x ( t ) ) λ min ( P ¯ ) | | x ( t ) | | 2 .
Using (15) and (16), it is concluded that
| | x ( t ) | | < λ max ( P ¯ ) + d ¯ λ max ( Q ¯ ) + d ¯ λ max ( S ¯ ) + d ¯ 2 λ max ( R ¯ ) + τ ¯ λ max ( Q ^ ) + τ ¯ λ max ( S ^ ) + τ ¯ 2 λ max ( R ^ ) λ min ( P ¯ ) | | ϕ | | d ^ e β t ,
meaning the closed-loop systems (7) are exponentially stable. It is also known from Theorem 2 that when the matrix inequality (11) holds, the error systems (5) and the closed-loop systems (7) are exponentially stable.
In summary, when the matrix inequalities (11) and (12) hold, the error systems (5) and the closed-loop systems (7) are exponentially stable. □
Remark 3.
In Theorem 3, the sufficient conditions (11) and (12) are not linear matrix inequalities, which cannot be solved by the LMI toolbox in MATLAB. Next, we will use Lemma 1 to transform the inequalities (11) and (12) into linear matrix inequalities.
Theorem 4.
Under the proposed output feedback fuzzy controller (6), the error systems (5) and the closed-loop systems (7) are exponentially stable if there exist matrices   L ¯ i R n × l , S 12 , S ˜ 12 , S 12 R n × n , K ¯ j R m × n , i , j = 1 , 2 , , q and positive-definite matrices P , Q , S , X , Q ˜ , S ˜ , Q , S R n × n , as well as scalars   α > 0 , β > 0 , ε > 0 , thus satisfying the condition (11) and the following linear matrix inequality
Ξ = Ξ 11 Ξ 12 S ˜ 12 Ξ 14 S 12 d ¯ X A i T τ ¯ X A i T Ξ 22 Ξ 23 0 0 d ¯ X A d i T τ ¯ X A d i T Ξ 33 0 0 0 0 Ξ 44 Ξ 45 d ¯ K ¯ j T B i T τ ¯ K ¯ j T B i T Ξ 55 0 0 X 0 X < 0 ,
where
Ξ 11 = A i X + X A i T + Q ˜ + S ˜ + Q + S + 2 β X + ε X 2 X Ξ 12 = A d i X + X S ˜ 12 Ξ 14 = B i K ¯ j + X S 12 Ξ 22 = ( 1 d ) e 2 β d ¯ Q ˜ 2 X + S ˜ 12 + S ˜ 12 T Ξ 23 = X S ˜ 12 Ξ 33 = e 2 β d ¯ S ˜ X Ξ 44 = ( 1 τ ) e 2 β τ ¯ Q 2 X + S 12 + S 12 T Ξ 45 = S 12 + X Ξ 55 = e 2 β τ ¯ S X .
The gain matrices of the fuzzy controller (6) can be obtained as K j = K ¯ j P ¯ .
Proof of Theorem 4.
Let
ϒ = d ¯ R ¯ T A i d ¯ R ¯ T A d i 0 d ¯ R ¯ T B i K j 0 T , Ζ = τ ¯ R ^ T A i τ ¯ R ^ T A d i 0 τ ¯ R ^ T B i K j 0 T .
As a result,
Θ = Θ 0 + ϒ R ¯ 1 ϒ T + Ζ R ^ 1 Ζ T
where
Θ 0 = Θ 011 P ¯ A d i + R ¯ S ¯ 12 S ¯ 12 P ¯ B i K j + R ^ S ^ 12 S ^ 12 Θ 022 R ¯ S ¯ 12 0 0 S ¯ e 2 β d ¯ R ¯ 0 0 Θ 044 S ^ 12 + R ^ S ^ e 2 β τ ¯ R ^
in which
Θ 011 = P ¯ A i + A i T P ¯ + Q ¯ + S ¯ + Q ^ + S ^ + 2 β P ¯ + ε P ¯ R ¯ R ^ Θ 022 = ( 1 d ) Q ¯ e 2 β d ¯ 2 R ¯ + S ¯ 12 + S ¯ 12 T Θ 044 = ( 1 τ ) Q ^ e 2 β τ ¯ 2 R ^ + S ^ 12 + S ^ 12 T
Applying Lemma 1, the inequality (12) is equivalent to
Π = Π 11 Π 12 S ¯ 12 Π 14 S ^ 12 d ¯ A i T R ¯ τ ¯ A i T R ^ Π 22 R ¯ S ¯ 12 0 0 d ¯ A d i T R ¯ τ ¯ A d i T R ^ Π 33 0 0 0 0 Π 44 S ^ 12 + R ^ d ¯ K j T B i T R ¯ τ ¯ K j T B i T R ^ Π 55 0 0 R ¯ 0 R ^ < 0
where
Π 11 = P ¯ A i + A i T P ¯ + Q ¯ + S ¯ + Q ^ + S ^ + 2 β P ¯ + ε P ¯ R ¯ R ^ Π 12 = P ¯ A d i + R ¯ S ¯ 12 Π 14 = P ¯ B i K j + R ^ S ^ 12 Π 22 = ( 1 d ) Q ¯ e 2 β d ¯ 2 R ¯ + S ¯ 12 + S ¯ 12 T Π 33 = S ¯ e 2 β d ¯ R ¯ Π 44 = ( 1 τ ) Q ^ e 2 β τ ¯ 2 R ^ + S ^ 12 + S ^ 12 T Π 55 = S ^ e 2 β τ ¯ R ^
Pre- and post-multiplying (18) by d i a g { P ¯ 1 , P ¯ 1 , P ¯ 1 , P ¯ 1 , P ¯ 1 , R ¯ 1 , R ^ 1 , } , we obtain evidence that the inequality (18) is equivalent to
Γ = Γ 11 Γ 12 P ¯ 1 S ¯ 12 P ¯ 1 Γ 14 P ¯ 1 S ^ 12 P ¯ 1 d ¯ P ¯ 1 A i T τ ¯ P ¯ 1 A i T Γ 22 Γ 23 0 0 d ¯ P ¯ 1 A d i T τ ¯ P ¯ 1 A d i T Γ 33 0 0 0 0 Γ 44 Γ 45 d ¯ P ¯ 1 K j T B i T τ ¯ P ¯ 1 K j T B i T Γ 55 0 0 R ¯ 1 0 R ^ 1 < 0
where
Γ 11 = A i P ¯ 1 + P ¯ 1 A i T + P ¯ 1 Q ¯ P ¯ 1 + P ¯ 1 S ¯ P ¯ 1 + P ¯ 1 Q ^ P ¯ 1 + P ¯ 1 S ^ P ¯ 1 + 2 β P ¯ 1 + ε P ¯ 1 P ¯ 1 R ¯ P ¯ 1 P ¯ 1 R ^ P ¯ 1 Γ 12 = A d i P ¯ 1 + P ¯ 1 R ¯ P ¯ 1 P ¯ 1 S ¯ 12 P ¯ 1 Γ 14 = B i K j P ¯ 1 + P ¯ 1 R ^ P ¯ 1 P ¯ 1 S ^ 12 P ¯ 1 Γ 22 = ( 1 d ) e 2 β d ¯ P ¯ 1 Q ¯ P ¯ 1 2 P ¯ 1 R ¯ P ¯ 1 + P ¯ 1 S ¯ 12 P ¯ 1 + P ¯ 1 S ¯ 12 T P ¯ 1 Γ 23 = P ¯ 1 R ¯ P ¯ 1 P ¯ 1 S ¯ 12 P ¯ 1 Γ 33 = e 2 β d ¯ P ¯ 1 S ¯ P ¯ 1 P ¯ 1 R ¯ P ¯ 1 Γ 44 = ( 1 τ ) e 2 β τ ¯ P ¯ 1 Q ^ P ¯ 1 2 P ¯ 1 R ^ P ¯ 1 + P ¯ 1 S ^ 12 P ¯ 1 + P ¯ 1 S ^ 12 T P ¯ 1 Γ 45 = P ¯ 1 S ^ 12 P ¯ 1 + P ¯ 1 R ^ P ¯ 1 Γ 55 = e 2 β τ ¯ P ¯ 1 S ^ P ¯ 1 P ¯ 1 R ^ P ¯ 1
Defining
X = P ¯ 1 , R ¯ = R ^ = P ¯ , Q ˜ = P ¯ 1 Q ¯ P ¯ 1 , S ˜ = P ¯ 1 S ¯ P ¯ 1 , Q = P ¯ 1 Q ^ P ¯ 1 , S = P ¯ 1 S ^ P ¯ 1 , S ˜ 12 = P ¯ 1 S ¯ 12 P ¯ 1 , K ¯ j = K j P ¯ 1 , S 12 = P ¯ 1 S ^ 12 P ¯ 1
the inequality (19) is equivalent to the inequality (17). □
Remark 4.
The sufficient conditions (11) and (17) are in terms of linear matrix inequality, which can be obtained by the LMI toolbox in MATLAB. The exponential stability  α  and  β  of the error systems and the closed-loop systems can be obtained, and the maximum values of delay  d ¯ , τ ¯  can be optimized.
Remark 5.
In order to optimize the exponential stability degree  α , β , we can select different values of  α , β , and solve the conditions (11) and (17) repeatedly, so as to obtain the optimization results.
Remark 6.
Theorem 4 gives the sufficient conditions (11) and (17) based on the existence of the dynamic output feedback fuzzy controller.

4. Simulation

To verify the effectiveness and superiority of the control design method proposed in this paper, we consider the following networked control systems with varying communication delays
x ˙ ( t ) = i = 1 3 μ i ( z ( t ) ) [ A i x ( t ) + A d i x ( t d ( t ) ) + B i u ( t τ ( t ) ) ] , y ( t ) = i = 1 3 μ i ( z ( t ) ) C i x ( t ) , x ( t ) = ϕ ( t ) ,                                            t [ d ^ , 0 ] ,
where
A 1 = 3 0 1 1 1 1 2 3 2 , A 2 = 0.1 1 0.1 0 2 0.5 0.1 0.5 3 , A 3 = 2 0.2 0.1 0.1 0.2 0.2 0.5 0.1 0.6 , A d 1 = 1 0 1 1 2 0 2 3 3 , A d 2 = 0.1 0 0.5 2 1 1 0.2 0.3 3 , A d 3 = 2 0.2 0.1 0.1 0.2 0.1 1.5 0.3 0.6 , B 1 = 1 1 0.3 , B 2 = 0.2 0.1 2 , B 3 = 1 2 1 , C 1 = 0.1 1 0.3 , C 2 = 0.2 0.4 3 ,
C 3 = 2 0.5 0.3 , μ 1 ( z ( t ) ) = sin ( t ) , μ 2 ( z ( t ) ) = cos ( t ) , μ 3 ( z ( t ) ) = 1 sin ( t ) cos ( t ) , d ¯ = 0.5 , τ ¯ = 0.4 , d ^ = 0.5 .
The state feedback controller can be obtained by using the algorithm in [20] as follows:
u ( t ) = 2.3285 2.0478 3.7652 x ( t ) .
On the other hand, using the proposed approach in this paper, by solving the linear matrix inequalities (11) and (17), we obtain the coefficient matrices of the controller and state observer as follows:
K ¯ 1 = 0.3276 0.2735 1.3287 , K ¯ 2 = 1.6527 0.3276 1.6287 , K ¯ 3 = 1.2746 1.4205 3.4189 , L ¯ 1 = 0.2135 1.4586 1.6254 T , L ¯ 2 = 2.5314 1.2067 2.4655 T , L ¯ 3 = 0.4256 0.1259 1.1563 T , X = 2.3372 0.1527 0.1472 0.1527 2.5526 0.2338 0.1472 0.2338 1.7624 .
After calculation, the dynamic output feedback controller is as follows:
u ( t ) = 2.1267 sin ( t ) + 1.7952 cos ( t ) 2.8775 sin ( t ) 0.3312 cos ( t ) 1.5661 sin ( t ) 0.1421 cos ( t ) x ^ ( t ) .
When we select the initial value condition such that
ϕ ( 0 ) = ψ ( 0 ) = 3 5 4 ,
and the sampling time k = 1 s , the response curves of the systems states x 1 ( t ) , x 2 ( t ) , x 3 ( t ) are obtained as shown in Figure 2, Figure 3 and Figure 4.
Figure 2 shows the variation in systems state x 1 ( t ) under two algorithms. The solid line is the response diagram of the systems state x 1 ( t ) under the control action designed by Theorem 4. The dotted line is the response diagram of the systems state x 1 ( t ) under the control action designed by the method given in [20]. It is easy to see from the graph that the solid line converges to 0 faster than the dotted line. The smoothness and overshoot of solid lines are significantly better than those of dotted lines.
Figure 3 shows the variation in systems state x 2 ( t ) under two algorithms. The solid line is the response diagram of the systems state x 2 ( t ) under the control action designed by Theorem 4. The dotted line is the response diagram of the systems state x 2 ( t ) under the control action designed by the method given in [20]. The solid line converges to a small neighborhood of origin within 7 s. The dotted line converges to a small neighborhood of origin only after 10 s, and the convergence speed is slow. The overshoots of the two lines are small, and the amplitude does not exceed 0.1.
Figure 4 shows the variation in systems state x 3 ( t ) under two algorithms. The solid line is the response diagram of the systems state x 3 ( t ) under the control action designed by Theorem 4. The dotted line is the response diagram of the systems state x 3 ( t ) under the control action designed by the method given in [20]. The solid line converges to a small neighborhood of origin within 5 s. The curve is smooth enough, the overshoot is small, and the amplitude does not exceed 0.1. The dotted line converges to a small neighborhood of origin only after 8 s and the convergence speed is slow. The smoothness of the curve is poor, the overshoot is large, and the amplitude reaches 2.
In order to further compare the advantages and disadvantages of the two algorithms, we introduce the following Integral Absolute Error (IAE) performance function to conduct a performance comparison analysis of the systems
I A E = 0 | e ( t ) | d t .
After calculation, the IAE performance index function changes, as shown in the following figure.
Figure 5 shows the changes in the IAE performance index of the systems under the two different algorithms. The solid line is the change curve of the IAE performance index of the systems under the algorithm in this paper. The dotted line is the change curve of the IAE performance index of the systems under the algorithm in [20]. The dotted line reaches the peak value 0.081 in 1.9 s. The solid line reaches the peak value 0.061 in 1.7 s. Overall, the slope of the dotted line is relatively large, and the upward speed is fast. The solid line is relatively flat and has good stability.
In summary, the fuzzy controller design method proposed in this article is superior to the method presented in [20].

5. Discussion

The contribution of this paper is to design an exponentially stable state observer and dynamic output feedback controller for T-S fuzzy network systems with both state delay and communication delay by using linear matrix inequality method. A less conservative and easy-to-solve method is proposed to reduce the impact of state delay and network communication delay on system performance. The innovation of this paper lies in the design of an exponentially stable state observer and the provision of design conditions for dynamic output feedback control in the form of linear matrix inequalities. It is worth mentioning that our research results can be extended to other types of network systems, such as those with distributed delay, rapidly changing delay, or random delay, which will be our next research work.

6. Conclusions

This paper designs an exponential stable observer and dynamic output feedback control for T-S fuzzy network systems with both state delay and communication delay. The main tasks are as follows: (I) Simultaneously considering the existence of time-varying state delay and network communication delay, T-S fuzzy method is used to establish a mathematical model of the network systems that is more in line with engineering practice. (II) Based on Lyapunov stability theory, an exponential stable state observer is designed by constructing a new Lyapunov functional. (III) Using matrix inequality transformation techniques, the nonlinear stability condition is transformed into a condition in the form of a linear matrix inequality, and a design method for exponential stability control of the systems is given. Unfortunately, the research results are focused on time delay network systems based on T-S models, and studying more complex nonlinear network systems, especially stochastic network systems, will be another topic for us in the future.

Author Contributions

H.Y.: Conceptualization, methodology, software, investigation, writing—original draft, validation. F.G.: software, resources, writing—review and editing, supervision. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Science and Technology Key Project Henan Province under Grant 242102220109.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Domagoj, T. Stabilizing transmission intervals and delays in nonlinear networked control systems through hybrid-system- with-memory modeling and Lyapunov-Krasovskii arguments. Nonlinear Anal. Hybrid Syst. 2020, 36, 100834. [Google Scholar]
  2. Song, J.S.; Chang, X.H. H∞ controller design of networked control systems with a new quantization structure. Appl. Math. Comput. 2020, 376, 125070. [Google Scholar] [CrossRef]
  3. Sun, H.Y.; Sun, J.; Chen, J. Analysis and synthesis of networked control systems with random network-induced delays and sampling intervals. Automatic 2021, 125, 109385. [Google Scholar] [CrossRef]
  4. Ding, T.F.; Ge, M.F.; Liu, Z.W.; Wang, Y.W.; Karimi, H.R. Lag-bipartite formation tracking of networked robotic systems over directed matrix-weighted. IEEE Trans. Cybern. 2022, 52, 6759–6770. [Google Scholar] [CrossRef] [PubMed]
  5. Park, J.M. An improved stability criterion for networked control systems with a constant transmission delay. J. Frankl. Inst. 2022, 359, 4346–4365. [Google Scholar] [CrossRef]
  6. Li, F.H.; Hou, Z.S. Learning-based model-free adaptive control for nonlinear discrete-time networked control systems under hybrid cyber attacks. IEEE Trans. Cybern. 2024, 54, 1560–1570. [Google Scholar] [CrossRef]
  7. Barmak, B.; Behrooz, R.; Zahra, R. Fuzzy-model-based fault detection for nonlinear networked control systems with periodic access constraints and Bernoulli packet dropouts. Appl. Soft Comput. 2019, 80, 465–474. [Google Scholar]
  8. Mani, P.; Joo, Y.H. Fuzzy-logic-based event-triggered H∞ control for networked systems and its application to wind turbine systems. Inf. Sci. 2022, 585, 144–161. [Google Scholar] [CrossRef]
  9. Kundu, A.; Quevedo, D.E. Stabilizing scheduling policies for networked control systems. IEEE Trans. Control Netw. Syst. 2020, 7, 163–175. [Google Scholar] [CrossRef]
  10. Wang, Y.L.; Yu, S.H. An improved dynamic quantization scheme for uncertain linear networked control systems. Automatica 2018, 92, 244–248. [Google Scholar] [CrossRef]
  11. Li, Y.J.; Liu, G.P.; Sun, S.L.; Tan, C. Prediction-based approach to finite-time stabilization of networked control systems with time delays and data packet dropouts. Neurocomputing 2019, 329, 320–328. [Google Scholar] [CrossRef]
  12. Chen, G.; Xia, J.; Zhuang, G. Improved delay-dependent stabilization for a class of networked control systems with nonlinear perturbations and two delay components. Appl. Math. Comput. 2018, 316, 1–17. [Google Scholar] [CrossRef]
  13. Qi, W.H.; Park, J.H.; Cheng, J.; Chen, X.M. Stochastic stability and L1 -gain analysis for positive nonlinear semi-Markov jump systems with time-varying delay via T-S fuzzy model approach. Fuzzy Sets Syst. 2019, 371, 110–122. [Google Scholar] [CrossRef]
  14. Wang, L.K.; Lam, H.K. New stability criterion for continuous-time Takagi-sugeno fuzzy systems with time varying delay. IEEE Trans. Cybern. 2019, 49, 1551–1556. [Google Scholar] [CrossRef] [PubMed]
  15. Yin, Z.; Jiang, X.; Tang, L. On stability and stabilization of T-S fuzzy systems with multiple random variables dependent time-varying delay. Neurocomputing 2020, 412, 91–100. [Google Scholar] [CrossRef]
  16. Roman, R.C.; Precup, R.E.; Petriu, E.M. Hybrid data-driven fuzzy active disturbance rejection control for tower crane systems. Eur. J. Control 2021, 58, 373–387. [Google Scholar] [CrossRef]
  17. Chi, R.H.; Li, H.Y.; Shen, D.; Hou, Z.S.; Huang, B. Enhanced P-type control: Indirect adaptive learning from set-point updates. IEEE Trans. Autom. Control 2022, 68, 1600–1613. [Google Scholar] [CrossRef]
  18. Li, X.H.; Ye, D. Observer-based defense control for networked Takagi-sugeno fuzzy systems against asynchronous DoS attacks. J. Frankl. Inst. 2021, 358, 6136–6160. [Google Scholar] [CrossRef]
  19. Xu, S.D.; Wen, H.; Wang, X.Y. Observer-based robust fuzzy control of nonlinear networked systems with actuator saturation. ISA Trans. 2022, 123, 122–135. [Google Scholar] [CrossRef]
  20. Zheng, W.; Zhang, Z.M.; Sun, F.C.; Wen, S.H. Robust stability analysis and feedback control for networked control systems with additive uncertainties and signal communication delay via matrices transformation information method. Inf. Sci. 2022, 582, 258–286. [Google Scholar] [CrossRef]
  21. Mahmoud, M.S.; Xia, Y.Q.; Zhang, S.X. Robust packet-based nonlinear fuzzy networked control systems. J. Frankl. Inst. 2019, 356, 1502–1521. [Google Scholar] [CrossRef]
  22. Zheng, W.; Zhang, Z.M.; Lam, H.K.; Sun, F.C.; Wen, S.H. LMIs-based stability analysis and fuzzy-logic controller design for networked systems with sector nonlinearities: Application in tunnel diode circuit. Expert Syst. Appl. 2022, 198, 116627. [Google Scholar] [CrossRef]
  23. Lian, Z.; Shi, P.; Lim, C.C. Hybrid-triggered interval type-2 fuzzy control for networked systems under attacks. Inf. Sci. 2021, 567, 332–347. [Google Scholar] [CrossRef]
  24. Cai, X.; Shi, K.B.; She, K.; Zhong, S.M.; Kwon, O.; Tang, Y.Q. Voluntary defense strategy and quantized sample-data control for T-S fuzzy networked control systems with stochastic cyber-attacks and its application. Appl. Math. Comput. 2022, 423, 126975. [Google Scholar] [CrossRef]
  25. Zhang, D.; Han, Q.; Jia, X. Network-based output tracking control for Takagi–Sugeno fuzzy systems using an event-triggered communication scheme. Fuzzy Sets Syst. 2015, 273, 26–48. [Google Scholar] [CrossRef]
  26. Su, M.Y.; Che, W.W. Model-free adaptive tracking control for networked control systems under DoS attacks and RTT delays. Int. J. Control Autom. Syst. 2022, 20, 2222–2230. [Google Scholar] [CrossRef]
  27. Du, Z.; Kao, Y.; Park, J.H.; Zhao, X.; Sun, J.A. Fuzzy event triggered control for nonlinear networked control systems. J. Frankl. Inst. 2022, 359, 2593–2607. [Google Scholar] [CrossRef]
  28. Li, Z.M.; Chang, X.H.; Xiong, J. Event-based fuzzy tracking control for nonlinear networked systems subject to dynamic quantization. IEEE Trans. Fuzzy Syst. 2022, 31, 941–954. [Google Scholar] [CrossRef]
  29. Chen, Z.; Zhang, Y.; Kong, Q.; Fang, T.; Wang, J. Observer based H∞ control for persistent dwell-time switched networked nonlinear systems under packet dropout. Appl. Math. Comput. 2022, 415, 126679. [Google Scholar] [CrossRef]
  30. Pan, Y.N.; Wu, Y.M.; Lam, H.K. Security-based fuzzy control for nonlinear networked control systems with DoS attacks via a resilient event-triggered scheme. IEEE Trans. Fuzzy Syst. 2022, 30, 4359–4368. [Google Scholar] [CrossRef]
  31. Aslam, M.S.; Radhika, T.; Chandrasekar, A.; Zhu, Q.X. Improved event-triggered-based output tracking for a class of delayed networked T–S fuzzy systems. Int. J. Fuzzy Syst. 2024, 26, 1247–1260. [Google Scholar] [CrossRef]
Figure 2. The response curves of the state x 1 ( t ) .
Figure 2. The response curves of the state x 1 ( t ) .
Mathematics 13 02513 g002
Figure 3. The response curves of the state x 2 ( t ) .
Figure 3. The response curves of the state x 2 ( t ) .
Mathematics 13 02513 g003
Figure 4. The response curves of the state x 3 ( t ) .
Figure 4. The response curves of the state x 3 ( t ) .
Mathematics 13 02513 g004
Figure 5. The change curve of the IAE performance index.
Figure 5. The change curve of the IAE performance index.
Mathematics 13 02513 g005
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yao, H.; Gao, F. Observer-Based Exponential Stability Control of T-S Fuzzy Networked Systems with Varying Communication Delays. Mathematics 2025, 13, 2513. https://doi.org/10.3390/math13152513

AMA Style

Yao H, Gao F. Observer-Based Exponential Stability Control of T-S Fuzzy Networked Systems with Varying Communication Delays. Mathematics. 2025; 13(15):2513. https://doi.org/10.3390/math13152513

Chicago/Turabian Style

Yao, Hejun, and Fangzheng Gao. 2025. "Observer-Based Exponential Stability Control of T-S Fuzzy Networked Systems with Varying Communication Delays" Mathematics 13, no. 15: 2513. https://doi.org/10.3390/math13152513

APA Style

Yao, H., & Gao, F. (2025). Observer-Based Exponential Stability Control of T-S Fuzzy Networked Systems with Varying Communication Delays. Mathematics, 13(15), 2513. https://doi.org/10.3390/math13152513

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop