Next Article in Journal
A Multi-Age Multi-Group Epidemiological Model and Its Validation on the COVID-19 Epidemic in Italy: SEIHRDV
Previous Article in Journal
Visual Servo Tracking Control and Scene Depth Identification of Mobile Robots with Velocity Saturation Constraints
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Integral-Based Memory Event-Triggered Controller Design for Uncertain Neural Networks with Control Input Missing

1
College of Mathematics and Systems Science, Shandong University of Science and Technology, Qingdao 266590, China
2
College of Science and Information, Qingdao Agricultural University, Qingdao 266109, China
*
Author to whom correspondence should be addressed.
Mathematics 2025, 13(5), 791; https://doi.org/10.3390/math13050791
Submission received: 17 February 2025 / Revised: 26 February 2025 / Accepted: 26 February 2025 / Published: 27 February 2025

Abstract

:
In this paper, the controller design problem for uncertain neural networks (NNs) with control input missing is addressed under an event-triggered (ET) scheme. First, under the zero-input method, the closed-loop system is modeled as a switched system which includes a stable subsystem and an unstable subsystem. Next, a novel integral-based memory event-triggered (IMET) scheme is designed, which can prevent Zeno behavior. The proposed IMET scheme is designed over a specified memory interval; thus, it can make full use of the historical state information, thereby reducing the adverse impact caused by packet dropouts. Then, with the analysis method of switched systems, a piecewise time-dependent Lyapunov functional is designed, and low conservative conditions are derived to ensure the exponential stability of the switched closed-loop system. Meanwhile, the constraints on the packet loss rate and the average dwell time are established. Moreover, the design of the controller gain is also given. Finally, the feasibility of IMET is verified using an example.

1. Introduction

Due to their powerful adaptability, self-organization, and self-learning abilities, neural networks (NNs) have become a research hotspot for many scholars [1,2,3,4]. However, in the implementation of NNs, uncertainties are often encountered because of inaccurate modeling or environmental noise, which can degrade system performance and further lead to system instability [5,6,7]. In addition, on account of unreliable communication channels and limited bandwidth, the control signal may not reach the receiving terminal successfully. Hence, data packet dropout is an inevitable problem for the control of NNs. When packet dropout occurs from the controller to the actuator channel, it is referred ti as missing control input [8]. This phenomenon is inevitable due to actuator failure, intermittent controller unavailability, and other reasons. Generally, there are two methods to cope with this problem. One is the hold-input method [9,10]; that is, when the controller signal is lost, the latest control signal is taken as the input of the actuator. The other is the zero-input method [11,12,13,14]; that is, when the control signal is lost, the input of the actuator is set to zero, then the controlled system can be converted to a switched system. Promising results on systems with packet dropout have been achieved. For example, based on the zero-input method, robust synchronization for uncertainty delayed NNs with control packet dropout was implemented under sampling control in [12]. For fuzzy system with packet dropouts, refs. [13,14] studied robust H control and exponential stabilization using the zero-input method under sampling control, respectively. It should be noted that although related research on neural networks incorporating these two network-induced phenomena has achieved certain results, there remains significant room for improvement.
On the other hand, networked control methods have attracted considerable attention in recent decades. As is well known, traditional time-triggered control methods will generate redundant data and therefore lead to over-occupation of limited communication bandwidth and blockage of information channels. It has been proved in [15] that the integration of an event-triggered scheme into the controller can effectively reduce the number of control task executions. Thereafter, ET control has attracted increasing attention from scholars [16,17,18,19,20]. The sampling of ET control is carried out only when a preset event is triggered; that is, the system will transmit information only as needed. In this way, the waste of network resources can be reduced while guaranteeing the expected performance. Among the existing ET schemes, the periodic event-triggered (PET) scheme is a classic one, in which the preset triggering condition is monitored periodically [21,22]. It can ensure that the interval between two adjacent triggers is greater than zero, so it can automatically avoid the emergence of Zeno phenomena. Based on the PET scheme, a novel ET scheme called the memory-based event-triggered (MET) scheme was devised in [23]. The MET scheme comprehensively utilizes the difference between historically transmitted data and the currently sampled data to design the triggering condition [24,25,26,27]. What needs to be pointed out is that most existing METs use the discrete mean value of a certain number of historically sampled or triggered data. However, if packet dropouts occur, some sampled data are partial, or all missing, then the effect of the MET scheme using a discrete mean value will be reduced. However, if the continuous mean value—that is, the integral over a past continuous interval—is employed to design the triggering condition, even if some sampled data are lost, the integral can still address the issue related to packet dropout due to the good property of the integral. In this way, both higher control performance and fewer triggering times can be achieved.
Enlightened by the above thoughts, this paper will investigate the stabilization of NNs with uncertainty and control input missing by designing an ET scheme. The contributions of this paper can be summarized as follows:
(1) To deal with the impact of packet dropout, a novel MET scheme, named IMET, is devised, which introduces an integral of the system state over a specified memory interval. The proposed IMET scheme can not only make use of the historical state information but also alleviate the effects of packet dropout and exclude the occurrence of Zeno phenomena.
(2) Under the proposed IMET scheme, the uncertain NN with control input missing is modeled by a switched system on the basis of the zero-input method. Then, a piecewise time-dependent Lyapunov functional consisting of a looped functional is designed. The exponential stability of the switched closed-loop system is analyzed and low conservative stability conditions and control gain design algorithms are developed.
The remainder of this paper is organized as follows. The IMET scheme is proposed and the closed-loop system is established in Section 1. The sufficient conditions for exponential stability and the co-design method of the control law are given in Section 2. The obtained results are verified using an example in Section 3. Section 4 concludes this paper.
Some special symbols are explained in Table 1.

2. Problem Formulation

Consider a NN with uncertainties modeled as follows:
x ˙ ( t ) = W 1 + Δ W 1 ( t ) x ( t ) + W 2 + Δ W 2 ( t ) f ( t , x ( t ) ) + u ( t ) ,
where x ( t ) , u ( t ) R n denote the state vector and the control input, respectively; W 1 and W 2 are known real matrices, and Δ W 1 ( t ) and Δ W 2 ( t ) represent the parameter uncertainties. The system nonlinearity f ( t , x ( t ) ) : R × R n R n is a piecewise-continuous function with f ( t , 0 ) = 0 and satisfies
f T ( t , x ( t ) ) f ( t , x ( t ) ) β 2 x T ( t ) H T H x ( t ) ,
where β > 0 is a constant and H is a constant matrix.
Assumption 1.
Suppose the parameter uncertainties Δ W 1 ( t ) and Δ W 2 ( t ) are of the following structure:
[ Δ W 1 ( t ) Δ W 2 ( t ) ] = N F ( t ) [ L 1 L 2 ] ,
where N R n × m , L 1 , L 2 R m × n are known real matrices and the uncertain matrix F ( t ) R m × m is bounded by
F T ( t ) F ( t ) I m , t 0 .
We denote k h ( k N ) as the sampling instants with sampling period h > 0 , and t k h ( k N ) with t 0 h = 0 as the triggering instants; that is, at t k h , the sampled data packets are transmitted. We define x ˜ ( t ) = 1 ϖ t ϖ t x ( s ) d s with the integral period ϖ > 0 . Then, the triggering condition of the IMET scheme is presented as follows:
t k + 1 h = t k h + l k h , with l k h = inf l N l h | e ˜ ( t k h + l h ) T Ω e ˜ ( t k h + l h ) ρ x ˜ T ( t k h ) Ω x ˜ ( t k h ) ,
where t k h + l h is the current sampling instant, and t k + 1 h is the next triggering instant to be determined; x ˜ ( t k h ) = 1 ϖ t k h ϖ t k h x ( s ) d s with the memory period ϖ > 0 and e ˜ ( t k h + l h ) = x ( t k h + l h ) x ˜ ( t k h ) ; Ω R + n × n is the triggering matrix to be designed, and 0 < ρ < 1 is a given constant.
Remark 1.
The existing MET (EMET) scheme is that proposed in [23].
t k + 1 h = t k h + inf l N l h | j = 1 m μ j e j T ( t ) Ω e j ( t ) ρ x ^ T ( t k h ) Ω x ^ ( t k h ) ,
where m denotes the number of historically transmitted packets, x ^ ( t k h ) = 1 m j = 1 m x ( t k + 1 j h ) , e j ( t ) = x ( t k h + l h ) x ( t k + 1 j h ) , and 0 μ j 1 , j = 1 m μ j = 1 . The distinction between EMET and IMET can be summarized in two points. First, the EMET scheme employs a discrete average of some historic data at t k h , such as x ^ ( t k h ) = 1 m j = 1 m x ( t k + 1 j h ) and j = 1 m μ j e j T ( t ) Ω e j ( t ) = j = 1 m μ j [ x ( t k h + l h ) x ( t k + 1 j h ] T Ω [ x ( t k h + l h ) x ( t k + 1 j h ] . However, the IMET scheme adopts the continuous mean of the system state over the interval [ t k h ϖ , t k h ) , resulting in x ˜ ( t k h ) = 1 ϖ t k h ϖ t k h x ( s ) d s and 1 ϖ t k h ϖ t k h e T ( s ) Ω e ( s ) d s = 1 ϖ t k h ϖ t k h [ x ( t k h + l h ) x ( s ) ] T Ω [ x ( t k h + l h ) x ( s ) ] d s . Second, IMET further incorporates the Jensen’s inequality to derive a more stringent triggering condition. Using Jensen’s inequality to 1 ϖ t k h ϖ t k h e T ( s ) Ω e ( s ) d s yields
1 ϖ t k h ϖ t k h e T ( s ) Ω e ( s ) d s = 1 ϖ t k h ϖ t k h [ x ( t k h + l h ) x ( s ) ] T Ω [ x ( t k h + l h ) x ( s ) ] d s [ x ( t k h + l h ) x ˜ ( t k h ) ] T Ω [ x ( t k h + l h ) x ˜ ( t k h ) ] , = e ˜ ( t k h + l h ) T Ω e ˜ ( t k h + l h ) .
Finally, the proposed IMET scheme can be obtained. Furthermore, the IMET scheme can exclude Zeno behavior directly, because it is devised on the basis of the PET scheme and therefore can guarantee t k + 1 h t k h h > 0 .
Remark 2.
It follows that the triggering condition of IMET is more stringent, which is beneficial for reducing redundant data transmission. Meanwhile, as is well known, the value of an integral over some time interval can not be affected by a finite number of discontinuous points. Therefore, for system (1), even if the sampled or triggered data at finite instants in [ t k h ϖ , t k h ) are missing, the introduction of the integral term can take full use of the historical information of the system state over this interval. In this way, it can better reflect the “memory" characteristic to reduce false triggers caused by fluctuations in signal measurements.
In this paper, the state feedback controller is taken as
u ( t ) = K x ˜ ( t k h ) , t [ t k h , t k + 1 h ) ,
where K is the control gain. By combining it with (3), the closed-loop system can be described as follows:
x ˙ ( t ) = W 1 x ( t ) + W 2 f ( t , x ( t ) ) + N F ( t ) [ L 1 x ( t ) + L 2 f ( t , x ( t ) ) ] + K x ˜ ( t k h ) , t [ t k h , t k + 1 h ) .
From a practical point of view, it is assumed that packet losses happen in the controller–actuator channel; that is to say, if some triggering instants t k h may be lost, then u ( t k h ) = 0 ,   t [ t k h , t k + 1 h ) . In this case, the closed-loop system with control packet loss has the following description:
x ˙ ( t ) = W 1 x ( t ) + W 2 f ( t , x ( t ) ) + N F ( t ) [ L 1 x + L 2 f ( t , x ( t ) ) ] .
If we introduce a switching signal σ ( t ) : [ 0 , ) S = { s , u } with K s = K and K u = 0 to distinguish whether the triggering instant is lost, then a switched system can be organized as follows:
x ˙ ( t ) = W 1 x ( t ) + W 2 f ( t , x ( t ) ) + N F ( t ) [ L 1 x ( t ) + L 2 f ( t , x ( t ) ) ] + K σ ( t ) x ˜ ( t k h ) , t [ t k h , t k + 1 h ) .
Obviously, system (9) switches between the stable subsystem (7) and the unstable subsystem (8).
The switched system based on the zero-input method is shown in Figure 1. From Figure 1, it can be observed that the occurrence of packet loss generates a switching signal σ ( t ) , which subsequently determines the value of the feedback controller and activates the corresponding subsystem.
Assumption 2.
In this paper, it is assumed that missing packets only occur in the controller–actuator channel, and δ is employed to represent the loss rate of control packets.
According to the triggering condition in (5), there are l k 1 sampling instants within the triggering interval ( t k h , t k + 1 h ) . Next, using the partition method, the triggering interval [ t k h , t k + 1 h ) can be written as follows:
[ t k h , t k + 1 h ) = l = 0 l k 1 t k h + l h , t k h + ( l + 1 ) h = l = 0 l k 1 J l .
We define the time-varying delay θ 1 ( t ) = t ( t k h + l h ) , t J l , then θ 1 ( t ) [ 0 , h ) . Thus, one can have the following:
x ˜ ( t k h ) = x ( t k h + l h ) e ˜ ( t k h + l h ) = x ( t θ 1 ( t ) ) e ˜ ( t k h + l h ) , t J l .
Therefore, the closed-loop system (9) can finally be expressed as follows:
x ˙ ( t ) = W 1 x ( t ) + W 2 f ( t , x ( t ) ) + N F ( t ) [ L 1 x ( t ) + L 2 f ( t , x ( t ) ) ] + K σ ( t ) [ x ( t θ 1 ( t ) ) e ˜ ( t k h + l h ) ] , t J l .
Definition 1
([28]). If there exist c 1 , c 2 > 0 satisfying
x ( t ) 2 c 1 e c 2 ( t t 0 ) · sup ϖ s 0 x ( t 0 + s ) 2 , t > t 0 .
then the closed-loop system (1) is said to be exponentially stable.
Definition 2.
For a switching signal σ ( t ) , if there exists a constant τ a > 0 , such that
N σ ( t ) ( t 1 , t 2 ) N 0 + t 1 t 2 τ a , t 1 > t 2 0 ,
holds for N 0 1 , where N σ ( t ) ( t 1 , t 2 ) stands for the number of switching events on ( t 2 , t 1 ) , then τ a is called the average dwell time (ADT) of σ ( t ) .
Lemma 1
([29]). For any continuously differentiable function x : [ a 1 , a 2 ] R , the following inequality holds for a given matrix H > 0 :
a 1 a 2 x ˙ T ( t ) H x ˙ ( t ) d t 1 a 2 a 1 x ( a 2 ) x ( a 1 ) T H x ( a 2 ) x ( a 1 ) + 3 a 2 a 1 X T H X ,
where X = x ( a 2 ) + x ( a 1 ) 2 a 2 a 1 a 1 a 2 x ( t ) d t .

3. Main Results

The stability criterion and the controller design for the resulting system (12) will be proposed in this section.
Theorem 1.
For given scalars β > 0 , ν > 0 , ρ > 0 , φ 1 > 0 , φ 2 > 0 , ϖ > 0 , λ s > 0 , λ u < 0 , μ > 1 and feedback gain matrix K, the closed-loop system in (12) is exponentially stable if there exist matrices P s , P u , Q s , Q u , S , Ω , R + n × n , R = R 11 R 12 R 22 R + 2 n × 2 n and matrices M 1 , M 2 R n × n , such that the following LMIs hold:
Σ 1 ν Γ T ν I m < 0 ,
Σ 2 ν Γ T ν I m < 0 ,
Π ν Λ T ν I m < 0 ,
P u μ P s , Q u μ e ( λ s λ u ) · ϖ Q s ,
P s μ P u , Q s μ Q u ,
where Σ 1 , Σ 2 R ( 7 n + m ) × ( 7 n + m ) and Π R ( 3 n + m ) × ( 3 n + m ) are symmetric matrices, and Σ 1 ( 1 , 1 ) = λ s P s 4 e λ s h h R 11 + φ 1 M 1 W 1 + φ 1 W 1 T M 1 T + Q s + β 2 H T H + ( λ s 4 h 2 h ) S , Σ 1 ( 1 , 2 ) = Σ 2 ( 1 , 2 ) = P s φ 1 M 1 + φ 2 W 1 T M 2 T + h 2 4 S , Σ 1 ( 1 , 3 ) = Σ 2 ( 1 , 3 ) = φ 1 M 1 W 2 , Σ 1 ( 1 , 4 ) = Σ 2 ( 1 , 4 ) = φ 1 M 1 N , Σ 1 ( 1 , 5 ) = Σ 2 ( 1 , 5 ) = 2 e λ s h h R 11 e λ s h R 12 + φ 1 M 1 K , Σ 1 ( 1 , 6 ) = Σ 2 ( 1 , 6 ) = φ 1 M 1 K , Σ 1 ( 1 , 7 ) = Σ 2 ( 1 , 7 ) = 6 e λ s h h R 11 , Σ 1 ( 2 , 2 ) = φ 2 ( M 2 + M 2 T ) , Σ 1 ( 2 , 3 ) = Σ 2 ( 2 , 3 ) = φ 2 M 2 W 2 , Σ 1 ( 2 , 4 ) = Σ 2 ( 2 , 4 ) = φ 2 M 2 N , Σ 1 ( 2 , 5 ) = φ 2 M 2 K , Σ 1 ( 2 , 6 ) = Σ 2 ( 2 , 6 ) = φ 2 M 2 K , Σ 1 ( 3 , 3 ) = Σ 2 ( 3 , 3 ) = I m , Σ 1 ( 4 , 4 ) = Σ 2 ( 4 , 4 ) = ν I m , Σ 1 ( 5 , 5 ) = Σ 2 ( 5 , 5 ) = 4 e λ s h h R 11 + 2 e λ s h R 12 + ρ Ω h e λ s h R 22 , Σ 1 ( 5 , 6 ) = Σ 2 ( 5 , 6 ) = ρ Ω , Σ 1 ( 5 , 7 ) = Σ 2 ( 5 , 7 ) = 6 e λ s h h R 11 , Σ 1 ( 6 , 6 ) = Σ 2 ( 6 , 6 ) = ( ρ 1 ) Ω , Σ 1 ( 7 , 7 ) = Σ 2 ( 7 , 7 ) = 12 e λ s h h R 11 , Σ 1 ( 8 , 8 ) = Σ 2 ( 8 , 8 ) = e λ s ϖ Q s , Σ 2 ( 1 , 1 ) = λ s P s 4 e λ s h h R 11 + φ 1 M 1 W 1 + φ 1 W 1 T M 1 T + Q s + β 2 H T H + ( λ s 4 h 2 + h ) S , Σ 2 ( 2 , 2 ) = φ 2 ( M 2 + M 2 T ) + h R 11 , Σ 2 ( 2 , 5 ) = φ 2 M 2 K + h R 12 , Σ 2 ( 5 , 5 ) = 4 e λ s h h R 11 + 2 e λ s h R 12 + ρ Ω + h R 22 , Π ( 1 , 1 ) = P u W 1 + W 1 T P u T + λ u P u + β 2 H T H + Q u , Π ( 1 , 2 ) = P u W 2 , Π ( 1 , 3 ) = P u N , Π ( 2 , 2 ) = I m , Π ( 3 , 3 ) = ν I m , Π ( 4 , 4 ) = Q u , Γ = [ L 1 0 m × n L 2 0 m × m 0 m × n 0 m × n 0 m × n 0 m × n ] , Λ = [ L 1 L 2 0 m × m 0 m × n ] . The ADT τ a and the pocket loss rate δ satisfy the following constraints:
τ a > ln μ λ s ( 1 δ ) + λ u δ , δ < λ s λ s λ u .
Proof. 
Consider a Lyapunov functional V ( t ) as follows, where V s ( t ) is for the stable subsystem (7) and V u ( t ) is for the unstable subsystem (8):
V ( t ) = V σ ( t ) ( t ) = V s ( t ) , for σ ( t ) = s V u ( t ) , for σ ( t ) = u , t J l ,
with
V s ( t ) = i = 1 4 V s i ( t ) , = x ( t ) T P s x ( t ) + 1 ϖ ϖ 0 t + v t e λ s ( s t ) x ( s ) T Q s x ( s ) d s d v + θ 2 ( t ) t θ 1 ( t ) t e λ s ( s t ) x ˙ ( s ) x ( t θ 1 ( t ) ) T R x ˙ ( s ) x ( t θ 1 ( t ) ) d s + θ 1 ( t ) θ 2 ( t ) x ( t ) T S x ( t ) ,
V u ( t ) = i = 1 2 V u i ( t ) , = x ( t ) T P u x ( t ) + 1 ϖ ϖ 0 t + v t e λ u ( s t ) x ( s ) T Q u x ( s ) d s d v ,
in which θ 1 ( t ) = t ( t k h + l h ) , θ 2 ( t ) = t k h + ( l + 1 ) h t , and λ s > 0 , λ u < 0 are given constants.
Case 1: When the closed-loop system (12) is in the stable subsystem, the derivative of V s ( t ) along the trajectory of the stable subsystem (7) is as follows:
V s ˙ ( t ) + λ s V s ( t ) 2 x ( t ) T P s x ˙ ( t ) + λ s x ( t ) T P s x ( t ) + x ( t ) T Q s x ( t ) 1 ϖ ϖ 0 e λ s v x ( t + v ) T Q s x ( t + v ) d v t θ 1 ( t ) t e λ s h x ˙ T ( s ) R 11 x ˙ ( s ) d s 2 e λ s h x ( t ) x ( t θ 1 ( t ) ) T R 12 x ( t θ 1 ( t ) ) θ 1 ( t ) e λ s h x T ( t θ 1 ( t ) ) R 22 x ( t θ 1 ( t ) ) + θ 2 ( t ) x ˙ ( t ) x ( t θ 1 ( t ) ) T R x ˙ ( t ) x ( t θ 1 ( t ) ) + [ θ 2 ( t ) θ 1 ( t ) ] x ( t ) T S x ( t ) + 2 θ 1 ( t ) θ 2 ( t ) x ( t ) T S x ˙ ( t ) + λ s θ 1 ( t ) θ 2 ( t ) x ( t ) T S x ( t ) .
By applying Jensen’s inequality to the first integral term in (22), one obtains the following:
1 ϖ ϖ 0 e λ s v x ( t + v ) T Q s x ( t + v ) d v = 1 ϖ t ϖ t e λ s ( s t ) x T ( s ) Q s x ( s ) d s , 1 ϖ t ϖ t e λ s ϖ x T ( s ) Q s x ( s ) d s , e λ s ϖ 1 ϖ t ϖ t x ( s ) d s T Q s 1 ϖ t ϖ t x ( s ) d s , = e λ s ϖ x ˜ T ( t ) Q s x ˜ ( t ) ,
with x ˜ ( t ) = 1 ϖ t ϖ t x ( s ) d s .
In terms of Lemma 1, the second integral term in (22) can be estimated as follows:
t θ 1 ( t ) t e λ s h x ˙ T ( s ) R 11 x ˙ ( s ) d s < e λ s h h x ( t ) x ( t θ 1 ( t ) ) ε ( t ) T 4 R 11 2 R 11 6 R 11 4 R 11 6 R 11 12 R 11 x ( t ) x ( t θ 1 ( t ) ) ε ( t ) ,
where ε ( t ) = 1 θ 1 ( t ) t θ 1 ( t ) t x ( s ) d s .
Utilizing the free-weighing matrix method, the following equation holds for constants φ 1 > 0 , φ 2 > 0 and appropriate dimension matrices M 1 , M 2 :
2 φ 1 x T ( t ) M 1 + 2 φ 2 x ˙ T ( t ) M 2 × x ˙ ( t ) + W 1 x ( t ) + W 2 f ( t , x ( t ) ) + N q ( t ) + K x ( t θ 1 ( t ) ) e ˜ ( t k h + l h ) = 0 ,
in which q ( t ) = F ( t ) p ( t ) and p ( t ) = L 1 x + L 2 f ( t , x ( t ) ) .
Meanwhile, based on (4), one obtains q T ( t ) q ( t ) p T ( t ) p ( t ) ; then, for constant ν > 0 , it follows that
ν ς T ( t ) Γ T Γ ς ( t ) q T ( t ) q ( t ) 0 ,
where ς ( t ) = col { x ( t ) , x ˙ ( t ) , f ( t , x ( t ) ) , q ( t ) , x ( t θ 1 ( t ) ) , e ˜ ( t k h + l h ) , ε ( t ) , x ˜ ( t ) } , Γ = [ L 1 0 m × n L 2 0 m × m 0 m × n 0 m × n 0 m × n 0 m × n ] .
Substituting (2), (5), (23)–(26) into (22), and considering the fact that
θ 1 ( t ) θ 2 ( t ) ( θ 1 ( t ) + θ 2 ( t ) ) 2 4 = h ( θ 1 ( t ) + θ 2 ( t ) ) 4 ,
we can have
V s ˙ ( t ) + λ s V s ( t ) ς T ( t ) θ 1 ( t ) h ( Σ 1 + ν Γ T Γ ) + θ 2 ( t ) h ( Σ 2 + ν Γ T Γ ) ς ( t ) ,
where Σ 1 , Σ 2 are defined in Theorem 1. Next, according to LMIs (14) and (15), one can finally obtain the following:
V s ˙ ( t ) + λ s V s ( t ) < 0 .
Case 2: When the closed-loop system (12) is in the unstable subsystem, taking the derivation of V u ( t ) yields the following:
V u ˙ ( t ) + λ u V u ( t ) = 2 x ( t ) T P u x ˙ ( t ) + λ s x ( t ) T P u x ( t ) + x ( t ) T Q u x ( t ) 1 ϖ ϖ 0 e λ u v x ( t + v ) T Q u x ( t + v ) d v .
With the same operation, we give the estimation of the integral term in (28) as follows:
1 ϖ ϖ 0 e λ u v x ( t + v ) T Q u x ( t + v ) d v x ˜ T ( t ) Q u x ˜ ( t ) ,
in which x ˜ ( t ) = 1 ϖ t ϖ t x ( s ) d s .
Simultaneously, we have the following identical equation and inequality:
ν η T ( t ) Λ T Λ η ( t ) q T ( t ) q ( t ) 0 ,
where η ( t ) = col { x ( t ) , f ( t , x ( t ) ) , q ( t ) , x ˜ ( t ) } and Λ = [ L 1 L 2 0 m × m 0 m × n ] .
Combining with (2), (28)–(30), one has the following:
V u ˙ ( t ) + λ u V u ( t ) η T ( t ) Π + ν Λ T Λ η ( t ) .
Based on (16), one can conclude the following:
V u ˙ ( t ) + λ u V u ( t ) < 0 .
Furthermore, synthesizing (27) and (32), one can now obtain that
V ˙ ( t ) + λ V ( t ) < 0 ,
in which λ = λ σ ( t ) = λ s , for σ ( t ) = s , λ u , for σ ( t ) = u .
Moreover, we denote { τ l } as the switching series between the stable subsystem and the unstable subsystem during ( 0 , t ) . Then, the triggering instant τ l may be transmitted or lost. In what follows, these two cases will be discussed in detail.
If τ l is the lost triggering instant, then one has the following:
V ( τ l ) = V s ( τ l ) = V s 1 ( τ l ) + V s 2 ( τ l ) , V ( τ l ) = V u ( τ l ) = V u 1 ( τ l ) + V u 2 ( τ l ) .
In terms of the condition in (17), one further has
V ( τ l ) μ V ( τ l ) .
If τ l is the transmitted triggering instant, then based on (18), the same result V ( τ l ) μ V ( τ l ) can still be obtained.
During the interval ( 0 , t ) , we denote T s ( 0 , t ) and T u ( 0 , t ) as the total length of all stable intervals and the total length of all unstable intervals, respectively. Obviously, the loss rate of control packet δ can be represented as follows:
δ = T u ( t ) t .
Let τ q be the switching instant nearest to t. Due to the condition (27), (32), and (34)–(35), the following holds:
V ( t ) e λ σ ( τ q ) ( t τ q ) V σ ( τ q ) ( τ q ) , μ e λ σ ( τ q ) ( t τ q ) V σ ( τ q ) ( τ q ) , μ N σ ( t ) ( t , 0 ) e λ s T s ( 0 , t ) e λ u T u ( 0 , t ) V ( 0 ) , μ N 0 + t τ a e λ s ( t δ t ) λ u δ t V ( 0 ) , = ϵ 1 e ϵ 2 t V ( 0 ) ,
with ϵ 1 = e N 0 ln μ , ϵ 2 = λ s ( 1 δ ) + λ u δ ln μ τ a .
In line with (20) and (21), one can obtain
V ( t ) λ 1 x ( t ) 2 ,
and
V ( 0 ) λ 2 x ( 0 ) 2 + ϖ · λ 3 sup ϖ s 0 x ( s ) 2 ϵ 3 sup ϖ s 0 x ( s ) 2 ,
in which λ 1 = min { λ min { P s } , λ min { P u } } , λ 2 = max { λ max { P s } , λ max { P u } } , λ 3 = max { λ max { Q s } , λ max { Q u } } and ϵ 3 = λ 2 + ϖ · λ 3 .
Considering (36), the following inequality can be deduced:
x ( t ) 2 ϵ 4 e ϵ 2 t sup ϖ s 0 x ( s ) 2 ,
where ϵ 4 = ϵ 1 ϵ 3 λ 1 . Thus, based on Definition 1, the system (12) is exponentially stable. □
Remark 3.
Looped functionals V s 3 ( t ) and V s 4 ( t ) can result in V s 3 ( t k h + l h ) = V s 3 ( t k h + ( l + 1 ) h ) = 0 and V s 4 ( t k h + l h ) = V s 4 ( t k h + ( l + 1 ) h ) = 0 , in which t k h + l h and t k h + ( l + 1 ) h are sampling instants. Given that the switching instant τ l comes from the set of sampling instants, it follows that V s 3 ( τ l ) = 0 and V s 4 ( τ l ) = 0 . As a result, V s 3 ( t ) and V s 4 ( t ) will not appear during the analysis of V ( τ l ) μ V ( τ l ) . This enables LMIs for system stability to be simplified, consequently enlarging the feasible region of the LMIs. Additionally, looped functionals V s 3 ( t ) and V s 4 ( t ) can fully utilize the system information over [ x ( t k h + l h ) , x ( t ) ) and [ x ( t ) , x ( t k h + ( l + 1 ) h ) ) , which contributes to obtaining results with reduced conservatism.
Next, the controller design for the system (1) based on the aforementioned analysis will be given by employing the matrix decoupling method.
Theorem 2.
For given positive scalars β, ν, ρ, ϖ, λ s , κ, φ 1 , φ 2 , μ > 1 and negative scalar λ u , the closed-loop system (1) is exponentially stable under the design of control gain matrix K = M 1 1 K ^ if there exist matrices P s , P u , Q s , Q u , S , Ω R + n × n , R R + 2 n × 2 n , arbitrary matrices M 1 , K ^ , such that the following LMIs hold:
Σ ^ 1 ν Γ T ν I m < 0 ,
Σ ^ 2 ν Γ T ν I m < 0 ,
Π ν Λ T ν I m < 0 ,
P u μ P s , Q u μ e ( λ s λ u ) · ϖ Q s ,
P s μ P u , Q s μ Q u ,
where Σ ^ 1 , Σ ^ 2 R ( 7 n + m ) × ( 7 n + m ) and Π R ( 3 n + m ) × ( 3 n + m ) are symmetric matrices, and Σ ^ 1 ( 1 , 2 ) = Σ ^ 2 ( 1 , 2 ) = P s φ 1 M 1 + κ φ 2 W 1 T M 1 T + h 2 4 S , Σ ^ 1 ( 1 , 5 ) = Σ ^ 2 ( 1 , 5 ) = 2 e λ s h h R 11 e λ s h R 12 + φ 1 K ^ , Σ ^ 1 ( 1 , 6 ) = Σ ^ 2 ( 1 , 6 ) = φ 1 K ^ , Σ ^ 1 ( 2 , 2 ) = κ φ 2 ( M 1 + M 1 T ) , Σ ^ 2 ( 2 , 2 ) = κ φ 2 ( M 1 + M 1 T ) + h R 11 , Σ ^ 1 ( 2 , 3 ) = Σ ^ 2 ( 2 , 3 ) = κ φ 2 M 1 W 2 , Σ ^ 1 ( 2 , 4 ) = Σ ^ 2 ( 2 , 4 ) = κ φ 2 M 1 N , Σ ^ 1 ( 2 , 5 ) = κ φ 2 K ^ , Σ ^ 2 ( 2 , 5 ) = κ φ 2 K ^ + h R 12 , Σ ^ 1 ( 2 , 6 ) = Σ ^ 2 ( 2 , 6 ) = κ φ 2 K ^ , the other blocks of Σ ^ 1 , Σ ^ 2 have the same definition as those of Σ 1 , Σ 2 in Theorem 1, and the ADT and the pocket loss rate satisfy τ a > ln μ λ s ( 1 δ ) + λ u δ and δ < λ s λ s λ u .
Proof. 
We define M 2 = κ M 1 , K ^ = M 1 K . Then, LMIs (14)–(18) can be represented as (37)–(41). Based on (37)–(41), one can calculate the gain matrix K = M 1 1 K ^ , which achieve the proof. □

4. Numerical Simulation

In this section, a numerical example will be employed to demonstrate the effectiveness of the proposed IMET scheme.
Example 1.
Consider the following NN with the following uncertainties:
W 1 = 1.8 0 0 1.9 , W 2 = 2.79 1 1 2.5 , N = 0.02 0.01 , f ( t , x ( t ) ) = 0.5 sin ( x 1 ( t ) ) 0.5 sin ( x 2 ( t ) ) , L 1 = 0.01 0.01 , L 2 = 0.02 0.01 , F ( t ) = 0.6 + 0.3 sin t .
The initial condition is chosen as x ( 0 ) = ( 0.2 , 0.1 ) T . We select λ s = 0.2 , λ u = 0.1 , then the loss rate is calculated as δ < 0.667 based on Condition (19) in Theorem 1. Then, we set δ = 0.1 and μ = 1.1 , and the ADT is calculated as τ a > 0.561 . We take κ = 1.1 , ρ = 0.3 , ϖ = 0.2 , β = 0.6 and constant matrix H = I 2 ; then, the control gain matrix and the triggering parameter Ω are calculated based on Theorem 2 as follows:
K = 0.418 0.141 0.098 0.498 , Ω = 5.667 2.746 2.746 8.824 .
The state responses under the EMET and the IMET are shown in Figure 2. It is clear that the system trajectories obtained via the IMET scheme are gentler and can converge to zero much faster than the ones obtained by the EMET. This means that the IMET can ensure better system performance. Figure 3 and Figure 4 present the execution interval and the cumulative triggering times for the EMET scheme and the IMET scheme, respectively. One can determine that the triggering interval of the IMET is larger that of the EMET. Meanwhile, the total triggering number for the IMET scheme is 33, which is less than 52 obtained via the EMET scheme. Combining Figure 2, Figure 3 and Figure 4, one can conclude that the proposed IMET scheme can reduce the network burden on the premise of ensuring good system performance.
Figure 5 displays the trajectories of the control input under the IMET scheme with packet loss rate δ = 0.1 . The intervals corresponding to u = 0 suggest that the system is under the unstable subsystem. The starting points of these intervals are the moments when the packets are lost, and the end points are the moments when the system is under the controller again. Meanwhile, the switching signal σ ( t ) is shown in Figure 6.

5. Conclusions

In this paper, by employing the zero-input method, the stabilization problem of an uncertain NN with missing input is converted into the stability problem of a switched system and then is addressed by developing an IMET scheme. Compared with the EMET scheme, the proposed IMET scheme is based on the PET scheme and therefore can prevent Zeno behavior naturally. Moreover, it introduces an integral over a past time interval of the latest triggering instant to construct the triggering condition. Therefore, even if the packets close to the current trigger are missing, it can still employ the integral to cover the information of the system with packet loss. To study the switched closed-loop system, a new piecewise Lyapunov functional is designed, which not only contains a looped functional to fully use the state information but also contains a Lyapunov functional involving the memory period of the IMET scheme. Then, by using this functional and combining with some inequalities, we establish sufficient conditions that guarantee the exponential stability of the resulting closed-loop system. Finally, an example is provided to analyze the validity of the obtained results.

Author Contributions

P.W. studied the stability and the control of the networked systems. Z.W. was in charge of the calculus theory and the simulation. H.X. provided recommendations for research; and, lastly, P.W. contributed to the contents and writing of the manuscript. All authors have read and approved the final manuscript.

Funding

This work was supported by the National Natural Science Foundation of China under grants 61973199, 62173214, the Shandong Provincial Natural Science Foundation ZR2021MF003, and the High-Level Talent Research Fund of Qingdao Agricultural University 663/1117028.

Data Availability Statement

The original contributions presented in the study are included in the article; further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare that they do not have any financial or non-financial conflicts of interest.

References

  1. Karthick, S.A.; Chen, B.S. Hybrid-triggered and fault-tolerant observer-based control for neural networks under malicious attacks. Neurocomputing 2023, 532, 114–128. [Google Scholar] [CrossRef]
  2. Feng, H.K.; Wu, Z.Y.; Zhang, X.X.; Xiao, Z.H.; Zhang, M.; Tao, J. Secure adaptive event-triggered anti-synchronization for BAM neural networks with energy-limited DoS attacks. Inf. Sci. 2024, 670, 120594. [Google Scholar] [CrossRef]
  3. Cheng, J.; Xu, J.M.; Yan, H.C.; Wu, Z.H.; Qi, W.H. Neural network-based sliding mode control for semi-markov jumping systems with singular perturbation. IEEE Trans. Cybern. 2025, 55, 259–268. [Google Scholar] [CrossRef]
  4. Vadivel, R.; Hammachukiattikul, P.; Gunasekaran, N.; Saravanakumarc, R.; Duttad, H. Strict dissipativity synchronization for delayed static neural networks: An event-triggered scheme. Chaos Solitons Fractals 2021, 150, 111212. [Google Scholar] [CrossRef]
  5. Wang, Z.H.; Zhang, L.S.; Raissi, T.; Shen, Y. Interval estimation for discrete-time takagi-sugeno fuzzy nonlinear systems with parameter uncertainties. IEEE Trans. Fuzzy Syst. 2024, 32, 2639–2649. [Google Scholar] [CrossRef]
  6. Li, C.S.; Guo, H.; Fu, J.; Pang, H.B. H∞ control for switched non-linear systems with structural uncertainty by using robust passivity. Nonlinear Anal. Hybrid Syst. 2021, 40, 101017. [Google Scholar]
  7. Fan, H.G.; Chen, X.J.; Shi, K.B.; Liang, Y.H.; Wang, Y.; Wen, H. Mittag-leffler synchronization in finite time for uncertain fractional-order multi-delayed memristive neural networks with time-varying perturbations via information feedback. Fractal Fract. 2024, 8, 422. [Google Scholar] [CrossRef]
  8. Zhang, W.A.; Yu, L. Stabilization of sampled-data control systems with control inputs missing. IEEE Trans. Autom. Control 2010, 55, 447–452. [Google Scholar] [CrossRef]
  9. Hu, Z.P.; Chen, K.; Deng, F.Q.; Luo, S.X.; Hu, S.L. H controller design for networked systems with two-channel packet dropouts and FDI attacks. IEEE Trans. Cybern. 2024, 54, 1661–1670. [Google Scholar] [CrossRef] [PubMed]
  10. Zhao, F.L.; Wang, Z.P.; Wu, H.N.; Wang, J.L.; Huang, T.W. Output synchronization of reaction-diffusion neural networks under random packet losses via event-triggered sampled-data control. Neurocomputing 2022, 514, 563–573. [Google Scholar] [CrossRef]
  11. Lu, R.Q.; Shi, P.; Su, H.Y.; Wu, Z.G.; Lu, J.Q. Synchronization of general chaotic neural networks with nonuniform sampling and packet missing: A switched system approach. IEEE Trans. Neural Netw. Learn. Syst. 2018, 29, 523–533. [Google Scholar] [CrossRef] [PubMed]
  12. Zhang, G.L.; Zhang, J.Y.; Li, W.; Ge, C.; Liu, Y.J. Robust synchronization of uncertain delayed neural networks with packet dropout using sampled-data control. Appl. Intell. 2021, 51, 9054–9065. [Google Scholar] [CrossRef]
  13. Cai, X.; Zhong, S.M.; Wang, J.; Shi, K.B. Robust H control for uncertain delayed T-S fuzzy systems with stochastic packet dropouts. Appl. Math. Comput. 2020, 385, 125432. [Google Scholar] [CrossRef]
  14. Ge, C.; Sun, R.; Liu, Y.J.; Feng, W. A switched system approach to exponential stabilization of interval type-2 fuzzy nonlinear systems with packet dropouts. J. Franklin Inst. 2024, 361, 106985. [Google Scholar] [CrossRef]
  15. Astrom, K.J.; Bernhardson, B. Comparison of periodic and event based sampling for first-order stochastic systems. IFAC Proc. Vol. 1999, 32, 5006–5011. [Google Scholar] [CrossRef]
  16. Zhao, S.W.; Wang, J.C. Robust optimal control for constrained uncertain switched systems subjected to input saturation: The adaptive event-triggered case. Nonlinear Dyn. 2022, 110, 363–380. [Google Scholar] [CrossRef]
  17. Ning, Z.K.; Wang, T.; Zhang, K. Dynamic event-triggered security control and fault detection for nonlinear systems with quantization and deception attack. Inf. Sci. 2022, 594, 43–59. [Google Scholar] [CrossRef]
  18. Li, H.; Hua, C.C.; Li, K.; Li, Q.D. Finite-time control of high-order nonlinear random systems using state triggering signals. IEEE Trans. Circuits Syst. I Regul. Pap. 2023, 70, 2587–2598. [Google Scholar] [CrossRef]
  19. Yue, X.H.; Zhang, H.G.; Sun, J.Y.; Wan, L. Adaptive event-triggered saturation-tolerant control for multiagent systems based on finite-time fuzzy learning. IEEE Trans. Fuzzy Syst. 2024, 32, 5638–5647. [Google Scholar] [CrossRef]
  20. Fu, J.; Qi, Y.W.; Xing, N.; Li, Y.Z. A new switching law for event-triggered switched systems under DoS attacks. Automatica 2022, 142, 110373. [Google Scholar] [CrossRef]
  21. Yue, D.; Tian, E.G.; Han, Q.L. A delay system method for designing event-triggered controllers of networked control systems. IEEE Trans. Autom. Control 2013, 58, 475–481. [Google Scholar] [CrossRef]
  22. Heemels, W.H.; Donkers, M.; Teel, A.R. Periodic event-triggered control for linear systems. IEEE Trans. Autom. Control 2013, 58, 847–861. [Google Scholar] [CrossRef]
  23. Tian, E.G.; Peng, C. Memory-based event-triggering H load frequency control for power systems under deception attacks. IEEE Trans. Cybern. 2020, 50, 4610–4618. [Google Scholar] [CrossRef] [PubMed]
  24. Wen, D.L.; Mu, X.W. Memory-based adaptive event-triggered asynchronous tracking control for semi-Markov jump systems with hybrid actuator faults. Nonlinear Anal. Hybrid Syst. 2023, 49, 101359. [Google Scholar] [CrossRef]
  25. Xie, L.F.; Cheng, J.; Wang, H.L.; Wang, J.G.; Hu, M.J.; Zhou, Z.D. Memory-based event-triggered asynchronous control for semi-Markov switching systems. Appl. Math. Comput. 2022, 415, 126694. [Google Scholar] [CrossRef]
  26. Wang, S.T.; Shi, K.B.; Cao, J.D.; Wen, S.P. Fuzzy spatiotemporal event-triggered control for the synchronization of IT2 T-S fuzzy CVRDNNs with mini-batch machine learning supervision. Neural Netw. 2025, 185, 107220. [Google Scholar] [CrossRef] [PubMed]
  27. Ni, Y.Y.; Wang, Z.; Fan, Y.J.; Huang, X.; Shen, H. Memory-based event-triggered control for global synchronization of chaotic Lur’e systems and its application. IEEE Trans. Syst. Man Cybern. Syst. 2023, 53, 1920–1931. [Google Scholar] [CrossRef]
  28. Sang, H.; Zhao, J. Exponential synchronization and L2-gain analysis of delayed chaotic neural networks via intermittent control with actuator saturation. IEEE Trans. Neural Netw. Learn. Syst. 2019, 30, 3722–3734. [Google Scholar] [CrossRef]
  29. Seuret, A.; Gouaisbaut, F. Wirtinger-based integral inequality: Application to time-delay systems. Automatica 2013, 49, 2860–2866. [Google Scholar] [CrossRef]
Figure 1. Overall block diagram of the switched system based on the zero-input method.
Figure 1. Overall block diagram of the switched system based on the zero-input method.
Mathematics 13 00791 g001
Figure 2. The trajectories of x i ( t ) under EMET and IMET.
Figure 2. The trajectories of x i ( t ) under EMET and IMET.
Mathematics 13 00791 g002
Figure 3. The execution interval.
Figure 3. The execution interval.
Mathematics 13 00791 g003
Figure 4. The cumulative triggering times.
Figure 4. The cumulative triggering times.
Mathematics 13 00791 g004
Figure 5. The trend of the control input u i ( t ) .
Figure 5. The trend of the control input u i ( t ) .
Mathematics 13 00791 g005
Figure 6. The switched signal.
Figure 6. The switched signal.
Mathematics 13 00791 g006
Table 1. Notations and descriptions.
Table 1. Notations and descriptions.
NotationDescription
N Set of non-negative integers
R n Set of n-dimensional real vectors
R n × m Set of n × m real matrices
R + n × n Set of symmetric positive-definite matrices 
M T ( M 1 ) Transposition (inverse) of matrix M
λ max ( M ) ( λ min ( M ) ) Maximum (minimum) eigenvalue of matrix M
M > 0 ( < 0 ) Real symmetric and positive (negative) definite matrix M
col { · } Column vector
I m m × m identity matrix
0 Zero matrix with appropriate dimensions
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, P.; Wang, Z.; Xu, H. Integral-Based Memory Event-Triggered Controller Design for Uncertain Neural Networks with Control Input Missing. Mathematics 2025, 13, 791. https://doi.org/10.3390/math13050791

AMA Style

Wang P, Wang Z, Xu H. Integral-Based Memory Event-Triggered Controller Design for Uncertain Neural Networks with Control Input Missing. Mathematics. 2025; 13(5):791. https://doi.org/10.3390/math13050791

Chicago/Turabian Style

Wang, Ping, Zhen Wang, and Haiyang Xu. 2025. "Integral-Based Memory Event-Triggered Controller Design for Uncertain Neural Networks with Control Input Missing" Mathematics 13, no. 5: 791. https://doi.org/10.3390/math13050791

APA Style

Wang, P., Wang, Z., & Xu, H. (2025). Integral-Based Memory Event-Triggered Controller Design for Uncertain Neural Networks with Control Input Missing. Mathematics, 13(5), 791. https://doi.org/10.3390/math13050791

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop