Next Article in Journal
A New Kinetic Model for Pectin Extraction from Grapefruit Peel Using Delayed Differential Equations
Previous Article in Journal
Optimized CO2 Modeling in Saline Aquifers: Evaluating Fluid Models and Grid Resolution for Enhanced CCS Performance
Previous Article in Special Issue
Adaptive Speed Tuning of Permanent Magnet Synchronous Motors Using Intelligent Fuzzy Based Controllers for Pumping Applications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Event-Based Dissipative Fuzzy Tracking Control for Nonlinear Networked Systems with Dynamic Quantization and Stochastic Deception Attacks

1
School of Electronic and Control Engineering, North China Institute of Aerospace Engineering, Langfang 065000, China
2
College of Artificial Intelligence, Hebei Oriental College, Langfang 065000, China
*
Author to whom correspondence should be addressed.
Processes 2025, 13(6), 1902; https://doi.org/10.3390/pr13061902
Submission received: 30 April 2025 / Revised: 8 June 2025 / Accepted: 13 June 2025 / Published: 16 June 2025
(This article belongs to the Special Issue Stability and Optimal Control of Linear Systems)

Abstract

:
This paper investigates the event-triggered dissipative fuzzy tracking control problem of nonlinear networked systems with dynamic quantization and stochastic deception attacks, where the Takagi–Sugeno (T-S) fuzzy system theory is utilized to represent the studied nonlinear networked systems. The event-triggered scheme and the dynamic quantization scheme with general online adjustment rule are employed to significantly decrease the data transmission amount and achieve the rational use of the limited communication and computation resources. A stochastic variable satisfying the Bernoulli random binary distribution is utilized to model the phenomenon of the stochastic deception attacks. The main purpose of this paper is to develop a secure event-triggered quantized tracking control scheme. This scheme guarantees the stochastic stability and prescribed dissipative tracking performance of the closed-loop system under stochastic deception attacks. Moreover, the design conditions for the desired static output feedback tracking controller are formulated in the form of linear matrix inequalities based on the matrix inequality decoupling strategy. Finally, two examples are exploited to illustrate the effectiveness of the developed tracking control scheme.

1. Introduction

In recent years, an increasing number of scholars have shown a strong interest in the study of networked systems. This heightened interest is driven primarily by the growing importance of networked systems in areas such as remote control, smart homes, autonomous driving, remote healthcare, and more. Compared to traditional systems, networked systems offer higher flexibility, security, real-time performance, and lower manpower and time costs [1]. However, networked systems face the challenge of limited communication media bandwidth for information exchange [2]. Effectively and efficiently utilizing limited communication resources has become a complex and challenging issue. Among the existing literature, quantification can effectively reduce data volume in network communication and was regarded as an effective method to deal with the above problem. Many scholars have conducted in-depth research on quantized networked systems and have published numerous excellent research results [3,4,5,6,7,8,9,10]. In addition, the event-triggered scheme was considered to be another effective solution to the above problem. Compared with the time-triggered scheme, the event-triggered scheme can set event-driven conditions so that only signals that meet the conditions are transmitted, thus reducing the burden on the network to a certain extent. Simultaneously, many literature works on different system design strategies based on event-triggered schemes have been published [7,8,9,10,11,12]. Furthermore, due to the possibility of external threats to the communication channels of networked systems, there is a risk of vulnerability to cyber attacks. Cyber attacks are malicious destructive measures targeting networked systems, infrastructure and network devices, which pose a serious threat to the performance of the system. Therefore, how to deal with cyber attacks has become another important issue to be addressed in networked systems. With the rapid expansion of networks, ensuring that networked systems maintain their intended performance in the face of cyber attacks is crucial. In the existing research, some works in the literature have discussed the control issue of networked systems under cyber attacks; see, e.g., [10,12], and references therein.
In the current field of control research, due to the inevitable existence of nonlinearity in actual physical systems, the study of nonlinear systems has always been one of the most important topics. Among the existing methodologies to study the nonlinear systems, the Takagi–Sugeno (T-S) fuzzy model method shows significant advantages in dealing with the design problems for nonlinear systems. The T-S fuzzy model method can provide a convenient and effective approach to describe complex nonlinear control systems through a set of fuzzy if–then rules, and has become one of the main methods for describing nonlinear systems. Therefore, the study of nonlinear systems based on the T-S fuzzy model approach has received increasing attention and achieved some meaningful research results; see, e.g., [13,14,15], and references therein. Furthermore, in recent years, the research on nonlinear networked systems by using the T-S fuzzy model approach has also received extensive attention, and a series of important papers have been published: the problem of output feedback control for nonlinear networked systems with quantization was studied in [16,17,18], the output feedback control problem of nonlinear networked systems was discussed based on event-triggered schemes in [17,18,19,20], and the security control design strategies of nonlinear networked systems with cyber attacks were given in [18,19,20,21].
Furthermore, in the field of control, tracking control has always been regarded as a very important research topic and has been widely applied in manufacturing systems such as CNC (Computerized Numerical Control) machine tools, advanced weapons, and aerospace engineering. The focus of tracking control is to design a tracking controller that enables the controlled system to achieve stability and the predetermined tracking performance. In recent years, the research on output feedback tracking control has gradually become an important issue in networked control systems, and a series of significant papers have been published. For example, the H tracking control problem of networked systems was studied in [22], the H output tracking control problem of networked control systems under event-triggered schemes was considered in [23], the tracking control problem of discrete time-varying systems with time delays and quantization was investigated in [24], and the tracking control problem of nonlinear systems with quantization was discussed in [25]. Based on the T-S fuzzy model method, the tracking control problem for nonlinear systems was investigated in [26,27], the output tracking control and filtering problems of discrete nonlinear descriptor systems were studied in [28], and the tracking control problem of nonlinear networked control systems with external disturbances and random package dropouts was discussed in [29]. The observer-based output feedback tracking control problem for discrete-time nonlinear networked control systems was studied in [30], the network-based output tracking control problem of T-S fuzzy systems was discussed in [31], a new remote tracking control strategy for nonlinear discrete-time fuzzy systems was proposed in [32], the quantized static output feedback dissipative tracking control problem of discrete-time nonlinear networked systems was addressed in [33], the observer-based output feedback non-fragile tracking control problem of nonlinear networked systems was investigated in [34], the event-triggered state feedback tracking control problem of continuous-time nonlinear networked systems was studied in [35,36], the event-based output feedback tracking control problem of discrete-time nonlinear networked systems with quantization was addressed in [37,38], and the security event-triggered tracking control problem of nonlinear networked systems with quantization and cyber attacks was considered in [39]. The above literature review on the tracking control for networked systems has revealed that, up to now, little attention has been paid to the investigation of the event-based dissipative output feedback tracking control problem for nonlinear networked systems with dynamic quantization, particularly when the stochastic deception attacks are taken into consideration, which encourages us to conduct this study.
Based on the existing literature, the main contributions of this paper are summarized as follows.
(1)
The dissipative output feedback tracking control problem has been considered for discrete-time nonlinear networked systems with dynamic quantization and stochastic deception attacks.
(2)
Both the event-triggered scheme and the dynamic quantization scheme with general online adjustment rule are introduced to decrease the data transmission amount and achieve the rational use of the limited communication and computation resources rather than only the event-triggered scheme or quantization scheme.
(3)
Based on the decoupling strategy, the corresponding design conditions of the desired static output feedback tracking controller are proposed in the form of linear matrix inequalities, rather than the specific design algorithm or the design conditions in terms of linear matrix inequality subject to restricted system matrices.
The remainder of this paper is organized as follows. In Section 2, the problem considered in this paper is presented. The main research findings of this paper are elaborated in Section 3, and the effectiveness of the proposed method is demonstrated through simulation examples in Section 4. The paper is summarized in Section 5.

2. Problem Formulation

Figure 1 gives the block diagram of the tracking control problem for nonlinear networked systems addressed in this paper. In the following, we will mathematically formulate the addressed problem.

2.1. T-S Fuzzy Systems

In this paper, the following discrete-time T-S fuzzy system will be utilized to approximate the concerned nonlinear plant and the j t h rule is expressed as follows:
Plant Rule j : IF ϑ 1 ( k ) is Θ j 1 , ϑ 2 ( k ) is Θ j 2 , and , , and ϑ θ ( k ) is Θ j θ
THEN x ( k + 1 ) = A j x ( k ) + B j u f d ( k ) + E j w s ( k ) y ( k ) = C j x ( k )
in which j = 1 , 2 , , n and n represents the number of the if–then fuzzy rules. The fuzzy sets are denoted as Θ j m , with m = 1 , 2 , , θ . ϑ ( k ) = [ ϑ 1 ( k ) , ϑ 2 ( k ) , , ϑ θ ( k ) ] stands for the premise variable. x ( k ) R n x , u f d ( k ) R n u , and y ( k ) R n y are employed to indicate the state variable, the control input, and the measurement output, respectively. w s ( k ) R n w s is utilized to describe the disturbance input belonging to l 2 [ 0 , ) . A j R n x × n x , B j R n x × n u , E j R n x × n w s , and C j R n y × n x are used to represent the given system parameters. In addition, the fuzzy basis functions can be expressed as
α j ( ϑ ( k ) ) = m = 1 θ Θ j m ( ϑ m ( k ) ) j = 1 n m = 1 θ Θ j m ( ϑ m ( k ) )
where the grade of membership of ϑ m ( k ) in Θ j m is represented by Θ j m ( ϑ m ( k ) ) . Then, one is able to conclude that
α j ( ϑ ( k ) ) 0 , j = 1 n α j ( ϑ ( k ) ) , j = 1 , 2 , , n .
Moreover, one is able to infer the considered T-S fuzzy system (1) as
x ( k + 1 ) = A ( α ) x ( k ) + B ( α ) u f d ( k ) + E ( α ) w s ( k ) y ( k ) = C ( α ) x ( k )
where
A ( α ) = j = 1 n α j ( ϑ ( k ) ) A j , B ( α ) = j = 1 n α j ( ϑ ( k ) ) B j , C ( α ) = j = 1 n α j ( ϑ ( k ) ) C j , E ( α ) = j = 1 n α j ( ϑ ( k ) ) E j .

2.2. Reference Model

This paper is concerned with the output feedback tracking control problem and the reference model is presented as
x ¯ ( k + 1 ) = A η x ¯ ( k ) + B η η ( k ) y ¯ ( k ) = C η x ¯ ( k )
where x ¯ ( k ) R n x ¯ indicates the state of the reference model, y ¯ ( k ) R n y represents the measurement output of the reference model, η ( k ) R n η denotes the reference input, which is assumed to be energy-bounded. A η R n x ¯ × n x ¯ , B η R n x ¯ × n η , and C η R n y × n x ¯ stand for known system matrices and A η is a Hurwitz matrix.

2.3. Event-Triggered Communication Scheme

The asynchronous event-triggered scheme developed in [38] will be employed in this paper to significantly decrease the data transmission amount and then conserve limited communication and computation resources. As in [38], the event-triggered condition associated with y ( k ) is
ζ y T ( k ) N 1 ζ y ( k ) β y y T ( k s ) N 2 y ( k s )
in which ζ y ( k ) = y ( k ) y ( k s ) , with y ( k ) and y ( k s ) denoting the measured output for the plant at the present instant and the one at the last triggering instant. N 1 and N 2 are two positive-definite weighting parameter matrices to be designed and 0 β y < 1 is the predetermined threshold.
The event-triggered condition associated with y ¯ ( k ) is
ζ y ¯ T ( k ) M 1 ζ y ¯ ( k ) β y ¯ y ¯ T ( k q ) M 2 y ¯ ( k q )
in which ζ y ¯ ( k ) = y ¯ ( k ) y ¯ ( k q ) , with y ¯ ( k ) and y ¯ ( k q ) representing the measured output for the reference model at the present instant and the one at the last triggering instant. M 1 and M 2 indicate two positive-definite weighting parameter matrices to be designed and 0 β y ¯ < 1 is the predetermined threshold.
Remark 1.
If we select β y = β y ¯ = 0 , the asynchronous event-triggered scheme investigated herein will be reduced to the traditional time-triggered scheme employed in [30,33]. If we select N 1 = N 2 and M 1 = M 2 , the asynchronous event-triggered scheme employed herein will be reduced to the one developed in [37]. Moreover, as claimed in [30,37,38], based on the fact that the various parts of the system are usually located at the different places for the tracking problem of networked systems, it can be concluded that the asynchronous event-triggered scheme utilized herein is more general than the synchronous event-triggered scheme considered in [23,35,36].

2.4. Dynamic Quantizers

As is well known, quantization is also considered to be an effective strategy to significantly decrease the data transmission amount and then achieve the rational use of the limited communication and computation resources. As far as the existing literature, there are mainly two schemes for investigating networked systems with quantization, i.e., the dynamic quantization scheme and the static quantization scheme. This paper adopts the dynamic quantization scheme proposed in [3]. Based on the results in [3], it can be obtained that
| f ς ( ς ) ς | Δ ς , IF | ς | M ς
| f ς ( ς ) ς | > M ς Δ ς , IF | ς | > M ς
where M ς represents the range of the quantizer and Δ ς represents the bound on the quantization error.
According to [3], one is able to deduce that the measured outputs with quantization and the control input with quantization considered in this paper are
y f ( k ) = f ρ y ( y ( k s ) ) = ρ y f y y ( k s ) ρ y = l y ( k s ) + y ( k s )
y ¯ f ( k ) = f ρ y ¯ ( y ¯ ( k q ) ) = ρ y ¯ f y ¯ y ¯ ( k q ) ρ y ¯ = l y ¯ ( k q ) + y ¯ ( k q )
u f ( k ) = f ρ u ( u ( k ) ) = ρ u f u u ( k ) ρ u = l u ( k ) + u ( k )
where ρ ς ( ς = y , y ¯ , u ) are used to represent the dynamic parameters of the quantizer f ς ( ς ) and
l y ( k s ) = ρ y f y y ( k s ) ρ y y ( k s ) ρ y , l y ¯ ( k q ) = ρ y ¯ f y ¯ y ¯ ( k q ) ρ y ¯ y ¯ ( k q ) ρ y ¯ , l u ( k ) = ρ u f u u ( k ) ρ u u ( k ) ρ u .
Remark 2.
In contrast to the static quantization scheme utilized in [33,37], the main advantage of the dynamic quantization scheme introduced herein is that the asymptotic stability is able to be ensured under the finite number of quantization levels. The main reason for the above phenomenon is that the quantization levels can be scaled dynamically in order to increase the region of attraction and to attenuate the steady-state limit cycle. Compared with the existing investigations on quantized tracking control that focus solely on quantized input [25] or multiple quantized outputs [39], this paper presents a more generalized quantized tracking control framework by incorporating three dynamic quantizers. The proposed method significantly improves the efficient utilization of limited communication and computational resources.

2.5. Deception Attacks

As is well known, due to the openness and unreliability of the communication networks, cyber attacks are unavoidable during the process of signal transmission in networked systems. As a result, the effect of stochastic deception attacks on quantized control input will be addressed in this paper. Additionally, one is able to formulate the quantized control input subject to stochastic deception attacks as
u f d ( k ) = χ ( k ) d u ( k ) + ( 1 χ ( k ) ) u f ( k )
Here, d u ( k ) denotes the the deception signal and χ ( k ) stands for a Bernoulli distributed white sequence which is satisfied with the following two conditions:
Prob { χ ( k ) = 1 } = E { χ ( k ) } = χ ¯ Prob { χ ( k ) = 0 } = 1 χ ¯ .
χ ( k ) = 1 signifies that the received signal is the deception signal (that is, u f d ( k ) = d u ( k ) ) and χ ( k ) = 0 means that the received signal is the quantized control input (that is, u f d ( k ) = u f ( k ) ). Moreover, as in [39], a natural assumption with regard to the deception signal is given as follows:
d u T ( k ) d u ( k ) u f T ( k ) D u T D u u f ( k )
where D u is the known matrix for d u ( k ) .

2.6. Tracking Controller and Resulting System

For the discussed tracking control problem herein, the static output feedback tracking controller with the following form will be employed:
u ( k ) = L y y f ( k ) + L y ¯ y ¯ f ( k )
in which L y R n u × n y and L y ¯ R n u × n y are controller parameters to be determined.
Then, the resulting system is able to be expressed as
x ^ ( k + 1 ) = ( A 1 + χ ˜ ( k ) A 2 ) ψ ( k ) + ( D 1 + χ ˜ ( k ) D 2 ) d u ( k ) + ( L 1 + χ ˜ ( k ) L 2 ) l y ( k s ) + ( L 3 + χ ˜ ( k ) L 4 ) l y ¯ ( k q ) + ( L 5 + χ ˜ ( k ) L 6 ) l u ( k ) + E 1 w ( k ) e ^ ( k ) = C ψ ( k )
where x ^ T ( k ) = [ x T ( k ) x ¯ T ( k ) ] , w T ( k ) = [ w s T ( k ) η T ( k ) ] , ψ T ( k ) = [ x T ( k ) x ¯ T ( k ) ζ y T ( k ) ζ y ¯ T ( k ) ] , e ^ ( k ) = y ( k ) y ¯ ( k ) , χ ˜ ( k ) = χ ( k ) χ ¯ , and
A 1 = Γ 1 Γ 2 Γ 3 Γ 4 0 A η 0 0 , D 1 = χ ¯ B ( α ) 0 , A 2 = Γ 5 Γ 6 Γ 7 Γ 8 0 0 0 0 , D 2 = B ( α ) 0 , L 1 = ( 1 χ ¯ ) B ( α ) L y 0 , L 2 = B ( α ) L y 0 , L 3 = ( 1 χ ¯ ) B ( α ) L y ¯ 0 , L 4 = B ( α ) L y ¯ 0 , L 5 = ( 1 χ ¯ ) B ( α ) 0 , L 6 = B ( α ) 0 , E 1 = E ( α ) 0 0 B η , C = [ C ( α ) C η 0 0 ] ,
Γ 1 = A ( α ) + ( 1 χ ¯ ) B ( α ) L y C ( α ) , Γ 2 = ( 1 χ ¯ ) B ( α ) L y ¯ C η , Γ 3 = ( 1 χ ¯ ) B ( α ) L y , Γ 4 = ( 1 χ ¯ ) B ( α ) L y ¯ , Γ 5 = B ( α ) L y C ( α ) , Γ 6 = B ( α ) L y ¯ C η , Γ 7 = B ( α ) L y , Γ 8 = B ( α ) L y ¯ .
Before introducing the discussed tracking control problem, we first present the following definitions with regard to the stochastic stability and the dissipative tracking performance, which is essential to deal with the analysis problem of the resulting system in (17).
Definition 1.
For zero initial condition x ^ ( 0 ) = 0 , the stochastic stability of the resulting system in (17) can be ensured when w ( k ) = 0 , if there exists a matrix P > 0 satisfying
E k = 0 x ^ ( k ) 2 | x ^ ( 0 ) < x ^ T ( 0 ) P x ^ ( 0 ) .
Definition 2.
Suppose that the matrices J 1 = J 1 T R n y × n y 0 , J 2 R n y × ( n w s + n η ) , J 3 = J 3 T R ( n w s + n η ) × ( n w s + n η ) , and J 1 = J 11 T J 11 with J 11 R n y × n y 0 are known. Then, in the presence of zero initial condition ( x ^ ( 0 ) = 0 ) , the given dissipative tracking performance γ of the resulting system in (17) can be ensured as long as the inequality
k = 0 r e ^ T ( k ) J 1 e ^ ( k ) + e ^ T ( k ) J 2 w ( k ) + w T ( k ) × J 2 T e ^ ( k ) + w T ( k ) ( J 3 γ I ) w ( k ) 0
is satisfied for r > 0 .
Remark 3.
If we select J 1 = I , J 2 = 0 , J 3 = ( γ 2 + γ I ) , the dissipative tracking performance given in Definition 1 will be reduced to the H tracking performance investigated in [22,23,27,28,29,30,31,32]. If we select J 1 = 0 , J 2 = I , J 3 = 2 γ I , the dissipative tracking performance given in Definition 1 will be reduced to the passive tracking performance [40]. Furthermore, if we select J 1 = I , J 2 = ( 1 ) I , J 3 = ( ( γ 2 γ ) + 2 γ ) I with 0 1 standing for a given weighting parameter, the dissipative tracking performance given in Definition 1 will be reduced to the mixed passive/ H performance. Therefore, it is able to be concluded that the dissipative tracking problem considered herein is more general than the H tracking problem addressed in [22,23,27,28,29,30,31,32].
The investigated event-based tracking control problem in this paper is to design the static output feedback tracking controller in (16) such that the resulting system in (17) is satisfied with the following two requirements.
(1)
The stochastic stability of the resulting system in (17) is guaranteed for w ( k ) = 0 .
(2)
The given dissipative tracking performance of the resulting system in (17) is guaranteed for the zero initial condition.
In addition, to deal with the tracking controller design problem, a momentous lemma will be introduced, which is presented as follows.
Lemma 1
([14]). For matrices £ ı ( ı = 1 , 2 , 3 , 4 ) with appropriate dimensions, the inequality £ 1 + £ 2 £ 3 + £ 3 T £ 2 T < 0 is satisfied, if there exists a matrix £ 4 such that
£ 1 £ 2 T + £ 4 £ 3 £ 4 £ 4 T < 0 .

3. Main Results

3.1. Dissipative Tracking Performance Analysis

In this part, the analysis problem for the dissipative tracking performance of the resulting system in (17) will be studied. More specifically, based on the premise that the parameters for the desired tracking controller in (16) are provided, according to the Lyapunov theory, we shall formulate a sufficient condition in the following theorem to guarantee the stochastic stability in the sense of Definition 1 together with the dissipative tracking performance in the sense of Definition 2 of the resulting system in (17).
Theorem 1.
For given the quantization ranges M ς , the quantization error bounds Δ ς , the constants 0 < a 1 ς < a 2 ς , 0 < b 1 ς < b 2 ς , satisfying a 1 ς b 1 ς > 1 for ς = y , y ¯ , u , and the constants 0 β y < 1 , 0 β y ¯ < 1 . The stochastic stability as well as the prescribed dissipative tracking performance of the resulting system in (17) will be guaranteed if there exist matrices P > 0 , N 1 > 0 , N 2 > 0 , M 1 > 0 , and M 2 > 0 , positive scalars δ y , δ y ¯ , and o ς , ς = y , y ¯ , u satisfying the following inequalities:
a 1 ς M ς o ς a 2 ς M ς , ς = y , y ¯ , u
11 21 22 < 0
L y T L y < 1 δ y I
L y ¯ T L y ¯ < 1 δ y ¯ I
where
11 = P 0 I 0 0 I 0 0 0 I 0 0 0 0 I J 2 T C 0 0 0 0 J 3 γ I , 21 = [ S 0 T S 1 T S 2 T S 3 T S 4 T S 5 T S 6 T ] T , 22 = d i a g { P 1 , P 1 , I , I , I , δ y I , δ y ¯ I } ,
P = P ^ β y Λ y T N 2 Λ y β y ¯ Λ y ¯ T M 2 Λ y ¯ + C T J 1 C + N ¯ + M ¯ , S 0 = [ A 1 D 1 L 1 L 3 L 5 E 1 ] , S 1 = [ χ ^ A 2 χ ^ D 2 χ ^ L 2 χ ^ L 4 χ ^ L 6 0 ] , S 2 = [ D ˜ u 0 D u L y D u L y ¯ D u 0 ] , S 3 = [ σ y Λ y 0 0 0 0 0 ] , S 4 = [ σ y ¯ Λ y ¯ 0 0 0 0 0 ] , S 5 = [ 2 ( 1 + σ y ) σ u Λ y 0 0 0 0 0 ] , S 6 = [ 2 ( 1 + σ y ¯ ) σ u Λ y ¯ 0 0 0 0 0 ] , P ^ = d i a g { P , 0 , 0 } , Λ y = [ C ( α ) 0 I 0 ] , Λ y ¯ = [ 0 C η 0 I ] , N ¯ = d i a g { 0 , 0 , N 1 , 0 } , M ¯ = d i a g { 0 , 0 , 0 , M 1 } , D ˜ u = [ D u L y C ( α ) D u L y ¯ C η D u L y D u L y ¯ ] , σ y = a 2 y b 2 y Δ y M y , σ y ¯ = a 2 y ¯ b 2 y ¯ Δ y ¯ M y ¯ , σ u = a 2 u b 2 u Δ u M u , and it is able to formulate the online adjusting scheme of the dynamic parameters ρ ς , ς = y , y ¯ , u as
b 1 y o y | y ( k s ) | ρ y b 2 y o y | y ( k s ) | b 1 y ¯ o y ¯ | y ¯ ( k q ) | ρ y ¯ b 2 y ¯ o y ¯ | y ¯ ( k q ) | b 1 u o u | u ¯ ( k ) | ρ u b 2 u o u | u ¯ ( k ) | .
Proof. 
For the resulting system (17), one can naturally formulate the Lyapunov function as
V ( x ^ ( k ) ) = x ^ T ( k ) P x ^ ( k ) , P > 0 .
In consideration of the fact that E χ ˜ 2 ( k ) = χ ¯ 1 χ ¯ = χ ^ 2 , we have
E V x ^ ( k + 1 ) V x ^ ( k ) e ^ T ( k ) J 1 e ^ ( k ) e ^ T ( k ) × J 2 w ( k ) w T ( k ) J 2 T e ^ ( k ) w T ( k ) ( J 3 γ I ) w ( k ) = E x ^ T ( k + 1 ) P x ^ ( k + 1 ) x ^ T ( k ) P x ^ ( k ) e ^ T ( k ) × J 1 e ^ ( k ) e ^ T ( k ) J 2 w ( k ) w T ( k ) J 2 T e ^ ( k ) w T ( k ) ( J 3 γ I ) w ( k ) = E ( ( A 1 + χ ˜ ( k ) A 2 ) ψ ( k ) + ( D 1 + χ ˜ ( k ) D 2 ) d u ( k ) + ( L 1 + χ ˜ ( k ) L 2 ) l y ( k s ) + ( L 3 + χ ˜ ( k ) L 4 ) l y ¯ ( k q ) + ( L 5 + χ ˜ ( k ) L 6 ) l u ( k ) + E 1 w ( k ) ) T P × ( ( A 1 + χ ˜ ( k ) A 2 ) ψ ( k ) + ( D 1 + χ ˜ ( k ) D 2 ) d u ( k ) + ( L 1 + χ ˜ ( k ) L 2 ) l y ( k s ) + ( L 3 + χ ˜ ( k ) L 4 ) l y ¯ ( k q ) + ( L 5 + χ ˜ ( k ) L 6 ) l u ( k ) + E 1 w ( k ) ) x ^ T ( k ) P x ^ ( k ) ψ T ( k ) C T J 1 C ψ ( k ) ψ T ( k ) × C T J 2 w ( k ) w T ( k ) J 2 T C ψ ( k ) w T ( k ) ( J 3 γ I ) w ( k ) = Ψ T ( k ) ( E ( [ A 1 D 1 L 1 L 3 L 5 E 1 ] + χ ˜ ( k ) [ A 2 D 2 L 2 L 4 L 6 0 ] ) T P × ( [ A 1 D 1 L 1 L 3 L 5 E 1 ] + χ ˜ ( k ) [ A 2 D 2 L 2 L 4 L 6 0 ] ) [ C 0 0 0 0 0 ] T J 1 [ C 0 0 0 0 0 ] [ C 0 0 0 0 0 ] T [ 0 0 0 0 0 J 2 ] [ 0 0 0 0 0 J 2 ] T [ C 0 0 0 0 0 ] d i a g { P ^ , 0 , 0 , 0 , 0 , J 3 γ I } ) Ψ ( k ) = Ψ T ( k ) Z 0 Ψ ( k )
where Ψ T ( k ) = [ ψ T ( k ) d u T ( k ) l y T ( k s ) l y ¯ T ( k q ) l u T ( k ) w T ( k ) ] and
Z 0 = [ A 1 D 1 L 1 L 3 L 5 E 1 ] T P [ A 1 D 1 L 1 L 3 L 5 E 1 ] + χ ^ 2 [ A 2 D 2 L 2 L 4 L 6 0 ] T P [ A 2 D 2 L 2 L 4 L 6 0 ] [ C 0 0 0 0 0 ] T J 1 [ C 0 0 0 0 0 ] [ C 0 0 0 0 0 ] T [ 0 0 0 0 0 J 2 ] [ 0 0 0 0 0 J 2 ] T [ C 0 0 0 0 0 ] d i a g { P ^ , 0 , 0 , 0 , 0 , J 3 γ I } .
In light of the inequalities presented in (6) and (7), it is possible to deduce that β y ( y ( k ) ζ y ( k ) ) T N 2 ( y ( k ) ζ y ( k ) ) ζ y T ( k ) N 1 ζ y ( k ) 0 and β y ¯ ( y ¯ ( k ) ζ y ¯ ( k ) ) T M 2 ( y ¯ ( k ) ζ y ¯ ( k ) ) ζ y ¯ T ( k ) M 1 ζ y ¯ ( k ) 0 ; that is,
Ψ T ( k ) Z 1 Ψ ( k ) 0
Ψ T ( k ) Z 2 Ψ ( k ) 0
where
Z 1 = β y [ Λ y 0 0 0 0 0 ] T N 2 [ Λ y 0 0 0 0 0 ] d i a g { N ¯ , 0 , 0 , 0 , 0 , 0 } , Z 2 = β y ¯ [ Λ y ¯ 0 0 0 0 0 ] T M 2 [ Λ y ¯ 0 0 0 0 0 ] d i a g { M ¯ , 0 , 0 , 0 , 0 , 0 } .
From the constraint in (21) combined with the online adjusting scheme in (25), we are able to deduce that y ( k s ) M y a 1 y b 1 y ρ y ρ y M y . Moreover, based on the constraint in (8), we have l y ( k s ) ρ y Δ y b 2 y o y Δ y y ( k s ) σ y y ( k s ) , i.e., l y T ( k s ) l y ( k s ) σ y 2 ( y ( k ) ζ y ( k ) ) T ( y ( k ) ζ y ( k ) ) , which can be denoted as
Ψ T ( k ) Z 3 Ψ ( k ) 0
with
Z 3 = [ σ y Λ y 0 0 0 0 0 ] T [ σ y Λ y 0 0 0 0 0 ] d i a g { 0 , 0 , I , 0 , 0 , 0 } .
Similarly, combining the inequality in (21), the online adjusting scheme in (25), and the constraint in (8), we can obtain that l y ¯ T ( k q ) l y ¯ ( k q ) σ y ¯ 2 ( y ¯ ( k ) ζ y ¯ ( k ) ) T ( y ¯ ( k ) ζ y ¯ ( k ) ) , which can be expressed as
Ψ T ( k ) Z 4 Ψ ( k ) 0
with
Z 4 = [ σ y ¯ Λ y ¯ 0 0 0 0 0 ] T [ σ y ¯ Λ y ¯ 0 0 0 0 0 ] d i a g { 0 , 0 , 0 , I , 0 , 0 } .
In addition, for the quantized control input, we are able to deduce that l u T ( k ) l u ( k ) σ u 2 u T ( k ) u ( k ) ; that is,
l u T ( k ) l u ( k ) σ u 2 ( L y y f ( k ) + L y ¯ y ¯ f ( k ) ) T ( L y y f ( k ) + L y ¯ y ¯ f ( k ) ) = σ u 2 ( y f T ( k ) L y T L y y f ( k ) + y f T ( k ) L y T L y ¯ y ¯ f ( k ) + y ¯ f T ( k ) L y ¯ T L y y f ( k ) + y ¯ f T ( k ) L y ¯ T L y ¯ y ¯ f ( k ) ) σ u 2 ( 2 y f T ( k ) L y T L y y f ( k ) + 2 y ¯ f T ( k ) L y ¯ T L y ¯ y ¯ f ( k ) ) 2 σ u 2 ( 1 δ y y f T ( k ) y f ( k ) + 1 δ y ¯ y ¯ f T ( k ) y ¯ f ( k ) )
In consideration of the measured output with quantization presented in (10), we are able to conclude that
y f ( k ) = l y ( k s ) + y ( k s ) l y ( k s ) + y ( k s ) σ y y ( k s ) + y ( k s ) = ( 1 + σ y ) y ( k s )
which can be represented as
y f T ( k ) y f ( k ) ( 1 + σ y ) 2 y T ( k s ) y ( k s )
Similarly, for y ¯ f ( k ) , we obtain y ¯ f ( k ) ( 1 + σ y ¯ ) y ¯ ( k q ) , which can be rewritten as
y ¯ f T ( k ) y ¯ f ( k ) ( 1 + σ y ¯ ) 2 y ¯ T ( k q ) y ¯ ( k q )
By considering the inequalities in (34) and (35), one is able to reformulate the condition obtained in (32) as
l u T ( k ) l u ( k ) 2 σ u 2 1 δ y ( 1 + σ y ) 2 y T ( k s ) y ( k s ) + 1 δ y ¯ ( 1 + σ y ¯ ) 2 y ¯ T ( k q ) y ¯ ( k q )
which is equivalent to
Ψ T ( k ) Z 5 Ψ ( k ) 0
with
Z 5 = 2 ( 1 + σ y ) 2 δ y [ σ u Λ y 0 0 0 0 0 ] T [ σ u Λ y 0 0 0 0 0 ] + 2 ( 1 + σ y ¯ ) 2 δ y ¯ [ σ u Λ y ¯ 0 0 0 0 0 ] T [ σ u Λ y ¯ 0 0 0 0 0 ] d i a g { 0 , 0 , 0 , 0 , I , 0 } .
Afterwards, by recalling the constraint on the deception signal in (15), we have
Ψ T ( k ) Z 6 Ψ ( k ) 0
where
Z 6 = [ D ˜ u 0 D ^ u D u L y ¯ D u 0 ] T [ D ˜ u 0 D ^ u D u L y ¯ D u 0 ] d i a g { 0 , I , 0 , 0 , 0 , 0 }
with D ^ u = D u L y .
According to the Schur complement, one is able to express the condition given in (22) as
Z 0 + Z 1 + Z 2 + Z 3 + Z 4 + Z 5 + Z 6 < 0
Then, by employing the S-procedure, i.e., Lemma 1 in [5], one is able to obtain that Ψ T ( k ) Z 0 Ψ ( k ) < 0 holds; that is,
E V x ^ ( k + 1 ) V x ^ ( k ) e ^ T ( k ) J 1 e ^ ( k ) e ^ T ( k ) J 2 × w ( k ) w ( k ) T J 2 T e ^ ( k ) w ( k ) T ( J 3 γ I ) w ( k ) < 0
Next, by summing up the inequality in (40) from k = 0 to k = r , we are able to obtain that
E V x ^ ( r + 1 ) V x ^ ( 0 ) k = 0 r ( e ^ T ( k ) J 1 e ^ ( k ) e ^ T ( k ) × J 2 w ( k ) w ( k ) T J 2 T e ^ ( k ) w ( k ) T ( J 3 γ I ) w ( k ) ) < 0
By taking V x ^ ( r + 1 ) 0 combined with V x ^ ( 0 ) = 0 into consideration, we have
k = 0 r e ^ T ( k ) J 1 e ^ ( k ) + e ^ T ( k ) J 2 w ( k ) + w ( k ) T × J 2 T e ^ ( k ) + w ( k ) T ( J 3 γ I ) w ( k ) 0
As a result, based on Definition 2, we can deduce that the given dissipative tracking performance of the resulting system in (17) is able to be ensured by the conditions in (21)–(24) with the online adjusting scheme in (25).
Subsequently, when w ( k ) = 0 , one is going to prove that the stochastic stability of the resulting system in (17) is able to be ensured by the conditions in (21)–(24) with the online adjusting scheme in (25).
For w ( k ) = 0 , one is able to further represent the condition obtained in (40) as
E V x ^ ( k + 1 ) V x ^ ( k ) < e ^ T ( k ) J 1 e ^ ( k )
In consideration of J 1 0 , one is able to deduce that
E { V ( x ^ ( k + 1 ) ) } V ( x ^ ( k ) ) = Ψ ^ T ( k ) Z ^ 0 Ψ ^ ( k ) < 0
where Ψ ^ T ( k ) = [ ψ T ( k ) d u T ( k ) l y T ( k s ) l y ¯ T ( k q ) l u T ( k ) ] and
Z ^ 0 = [ A 1 D 1 L 1 L 3 L 5 ] T P [ A 1 D 1 L 1 L 3 L 5 ] + χ ^ 2 [ A 2 D 2 L 2 L 4 L 6 ] T P [ A 2 D 2 L 2 L 4 L 6 ] d i a g { P ^ , 0 , 0 , 0 , 0 } .
From (44), one is able to deduce that
E { V ( x ^ ( k + 1 ) ) } V ( x ^ ( k ) ) λ min ( Z ^ 0 ) Ψ ^ T ( k ) Ψ ^ ( k )
is satisfied. By taking mathematical expectation of the inequality in (45) and summing it up on both sides from k = 0 to k = φ ( φ 1 ), we have
E x ^ T ( φ + 1 ) P x ^ ( φ + 1 ) x ^ T ( 0 ) P x ^ ( 0 ) λ min Z ^ 0 E k = 0 φ Ψ ^ ( k ) 2
that is,
E k = 0 φ Ψ ^ ( k ) 2 x ^ T ( 0 ) P x ^ ( 0 ) E x ^ T ( φ + 1 ) P x ^ ( φ + 1 )
with = λ min Z ^ 0 1 . For φ , we have E k = 0 Ψ ^ ( k ) 2 E k = 0 x ^ ( k ) 2 and E x ^ T ( ) P x ^ ( ) 0 . Then, it can be obtained that the following inequality holds based on the inequality in (47):
E k = 0 x ^ ( k ) 2 λ min Z ^ 0 1 x ^ T ( 0 ) P x ^ ( 0 ) = x ^ T ( 0 ) λ min Z ^ 0 1 P x ^ ( 0 ) = x ^ T ( 0 ) P x ^ ( 0 )
with P = ( λ min ( Z ^ 0 ) ) 1 P .
By considering the fact that Ψ ^ T ( k ) Z ^ 0 Ψ ^ ( k ) < 0 , we can obtain that Z ^ 0 < 0 ; that is, λ min Z ^ 0 > 0 . On the basis of the above discussions, one is able to deduce that P = λ min Z ^ 0 1 P > 0 . As a result, based on Definition 1, for w ( k ) = 0 , we can conclude that the stochastic stability of the resulting system in (17) is able to be ensured by the conditions in (21)–(24) with the online adjusting scheme in (25). □
Remark 4.
The online adjusting scheme used in [5,38,39], can be obtained from the one in this paper if we select b 1 ς = b 2 ς , ς = y , y ¯ , u . Moreover, if we select a 1 ς = b 1 ς = 1 , b 2 ς = 2 , ς = y , y ¯ , u , the online adjusting scheme herein reduces to the one employed in [16,34]. As a result, it can be concluded that the online adjusting scheme for the dynamic parameters ρ ς ( ς = y , y ¯ , u ) given in Theorem 1 is more general than the one in the existing results.

3.2. Tracking Controller Design

In this subsection, in consideration of the results presented in Theorem 1 combined with the decoupling strategy proposed in [14], one is going to propose the design conditions with regard to the desired tracking controller in (16) according to linear matrix inequalities.
Theorem 2.
Given the quantization ranges M ς , the quantization error bounds Δ ς , the constants 0 < a 1 ς < a 2 ς , 0 < b 1 ς < b 2 ς , satisfying a 1 ς b 1 ς > 1 for ς = y , y ¯ , u , and the constants 0 β y < 1 , 0 β y ¯ < 1 . The stochastic stability as well as the prescribed dissipative tracking performance of the resulting system in (17) will be guaranteed if there exist matrices P 1 , P 2 , P 3 , X 1 , X 2 , Q y , Q y ¯ , G y , G y ¯ , N 1 > 0 , N 2 > 0 , M 1 > 0 , and M 2 > 0 , positive scalars δ y , δ y ¯ , and o ς , ς = y , y ¯ , u satisfying the online adjusting scheme in (25) with the inequalities (21), and the following inequalities:
P 1 P 2 P 3 > 0
Q j < 0
I G y Q y Q y T + δ y I < 0
I G y ¯ Q y ¯ Q y ¯ T + δ y ¯ I < 0
where
Q j = Ω 11 j 0 Ω 22 Ω 31 j 0 Ω 33 Ω ^ 41 j Ω ^ 42 j Ω 43 j Ω 44 Ω ^ 51 j Ω ^ 52 0 0 Ω 44 Ω ^ 61 j Ω ^ 62 0 0 0 Ω 66 Ω 71 j Ω 72 0 Ω 74 j Ω 75 j Ω 76 Ω 77 , Ω 11 j = O 11 j P 2 + C η T J 1 C j O 22 β y N 2 C j 0 O 33 0 β y ¯ M 2 C η 0 O 44 , Ω 22 = d i a g { I , I , I , I } , Ω 31 j = J 21 T C j J 21 T C η 0 0 J 22 T C j J 22 T C η 0 0 , Ω 33 = J 31 + γ I J 32 J 33 + γ I , Ω ^ 41 j = O 51 j O 52 j O 53 j O 54 j 0 X 2 A η 0 0 , Ω ^ 42 j = O 61 j O 62 j O 63 j O 64 j 0 0 0 0 , Ω 43 j = X 1 E j 0 0 X 2 B η , Ω 44 = X 1 X 1 T + P 1 P 2 X 2 X 2 T + P 3 , Ω ^ 51 j = O 71 j O 52 j O 53 j O 54 j 0 0 0 0 , Ω ^ 52 j = O 81 j O 62 j O 63 j O 84 j 0 0 0 0 , Ω ^ 61 j = D u G y C j D u G y ¯ C η D u G y D u G y ¯ σ y C j 0 σ y I 0 0 σ y ¯ C η 0 σ y ¯ I O 91 j 0 O 92 0 0 O 93 0 O 94 , Ω ^ 62 = 0 D u G y D u G y ¯ D u 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 , Ω 66 = d i a g { I , I , I , δ y I , δ y ¯ I } , Ω 71 j = G y C j 0 G y 0 0 G y ¯ C η 0 G y ¯ ,
Ω 72 = 0 G y 0 0 0 0 G y ¯ 0 , Ω 74 j = ( ( 1 χ ¯ ) X 1 B j B j Q y ) T 0 ( ( 1 χ ¯ ) X 1 B j B j Q y ¯ ) T 0 , Ω 75 j = ( χ ^ X 1 B j B j Q y ) T 0 ( χ ^ X 1 B j B j Q y ¯ ) T 0 , Ω 76 = ( D u D u Q y ) T 0 0 0 0 ( D u D u Q y ¯ ) T 0 0 0 0 , Ω 77 = Q y Q y T 0 0 Q y ¯ Q y ¯ T ,
O 11 j = P 1 + β y C j T N 2 C j C j T J 1 C j , O 22 = P 3 + β y ¯ C η T M 2 C η C η T J 1 C η , O 33 = β y N 2 N 1 , O 44 = β y ¯ M 2 M 1 , O 51 j = X 1 A j + B j G y C j , O 52 j = B j G y ¯ C η , O 53 j = B j G y , O 54 j = B j G y ¯ , O 61 j = χ ¯ X 1 B j , O 62 j = B j G y , O 63 j = B j G y ¯ , O 64 j = ( 1 χ ¯ ) X 1 B j , O 71 j = B j G y C j , O 81 j = χ ^ X 1 B j , O 84 j = χ ^ X 1 B j , O 91 j = 2 ( 1 + σ y ) σ u C j , O 92 = 2 ( 1 + σ y ) σ u , O 93 = 2 ( 1 + σ y ¯ ) σ u C η , O 94 = 2 ( 1 + σ y ¯ ) σ u .
Additionally, one is able to calculate the parameters with regard to the desired tracking controller in (16) by
L y = Q y 1 G y , L y ¯ = Q y ¯ 1 G y ¯ .
Proof. 
Pre- and post-multiplying the inequality in (22) by d i a g { I , X T } with X T = d i a g { X T , X T , I , I , I , I , I } , one is able to deduce that
Π 11 Φ 21 Φ 22 < 0
where Φ 21 = [ S ¯ 0 T S ¯ 1 T S 2 T S 3 T S 4 T S 5 T S 6 T ] T , Φ 22 = d i a g { X T P 1 X , X T P 1 X , I , I , I , δ y I , δ y ¯ I } , with S ¯ 0 = X T S 0 and S ¯ 1 = X T S 1 .
For ( P X ) T P 1 ( P X ) 0 and P > 0 , we can obtain that X T P 1 X X T X + P . Then, based on the inequality in (54), we have
Π 11 Φ 21 Υ 22 < 0 .
where Υ 22 = d i a g { X ^ , X ^ , I , I , I , δ y I , δ y ¯ I } with X ^ = X T + X P . Without losing any generality, we can assume that X T = d i a g { X 1 , X 2 } and
P = P 1 P 2 P 3 , J 2 = J 21 R n y × n w s J 22 R n y × n η , J 3 = J 31 R n w s × n w s J 32 T R n w s × n η J 32 R n η × n w s J 33 R n η × n η .
Then, inequality (55) can be reformulated as
Ω 11 0 Ω 22 Ω 31 0 Ω 33 Ω 41 Ω 42 Ω 43 Ω 44 Ω 51 Ω 52 0 0 Ω 44 Ω 61 Ω 62 0 0 0 Ω 66 < 0
where
Ω 11 = O 11 P 2 + C η T J 1 C ( α ) O 22 β y N 2 C ( α ) 0 O 33 0 β y ¯ M 2 C η 0 O 44 , Ω 31 = J 21 T C ( α ) J 21 T C η 0 0 J 22 T C ( α ) J 22 T C η 0 0 , Ω 41 = O 51 O 52 O 53 O 54 0 X 2 A η 0 0 , Ω 42 = O 61 O 62 O 63 O 64 0 0 0 0 , Ω 43 = X 1 E ( α ) 0 0 X 2 B η , Ω 51 = O 71 O 72 O 73 O 74 0 0 0 0 , Ω 52 = O 81 O 82 O 83 O 84 0 0 0 0 , Ω 61 = D u L y C ( α ) D u L y ¯ C η D u L y D u L y ¯ σ y C ( α ) 0 σ y I 0 0 σ y ¯ C η 0 σ y ¯ I O 91 0 O 92 0 0 O 93 0 O 94 , Ω 62 = 0 D u L y D u L y ¯ D u 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ,
O 11 = P 1 + β y C T ( α ) N 2 C ( α ) C T ( α ) J 1 C ( α ) , O 51 = X 1 A ( α ) + ( 1 χ ¯ ) X 1 B ( α ) L y C ( α ) , O 52 = ( 1 χ ¯ ) X 1 B ( α ) L y ¯ C η , O 53 = ( 1 χ ¯ ) X 1 B ( α ) L y , O 54 = ( 1 χ ¯ ) X 1 B ( α ) L y ¯ , O 61 = χ ¯ X 1 B ( α ) , O 62 = ( 1 χ ¯ ) X 1 B ( α ) L y , O 63 = ( 1 χ ¯ ) X 1 B ( α ) L y ¯ , O 64 = ( 1 χ ¯ ) X 1 B ( α ) , O 71 = χ ^ X 1 B ( α ) L y C ( α ) , O 72 = χ ^ X 1 B ( α ) L y ¯ C η , O 73 = χ ^ X 1 B ( α ) L y , O 74 = χ ^ X 1 B ( α ) L y ¯ , O 81 = χ ^ X 1 B ( α ) , O 82 = χ ^ X 1 B ( α ) L y , O 83 = χ ^ X 1 B ( α ) L y ¯ , O 84 = χ ^ X 1 B ( α ) , O 91 = 2 ( 1 + σ y ) σ u C ( α ) , O 92 = 2 ( 1 + σ y ) σ u I , O 93 = 2 ( 1 + σ y ¯ ) σ u C η , O 94 = 2 ( 1 + σ y ¯ ) σ u I .
It can be observed that the inequality in (57) cannot directly address the design problem for the required tracking controller due to its non-convexity. Therefore, to acquire the convex design condition, we will employ the decoupling scheme proposed in [14] to deal with the inequality in (57). To this end, by defining L y = Q y 1 G y and L y ¯ = Q y ¯ 1 G y ¯ , we can rewrite the inequality in (57) as
1 + 2 3 + 3 T 2 T < 0
where
1 = Ω 11 0 Ω 22 Ω 31 0 Ω 33 Ω ^ 41 Ω ^ 42 Ω 43 Ω 44 Ω ^ 51 Ω ^ 52 0 0 Ω 44 Ω ^ 61 Ω ^ 62 0 0 0 Ω 66 , 2 T = 0 0 0 𝒱 1 𝒱 3 𝒱 5 0 0 0 𝒱 2 𝒱 4 𝒱 6 , 3 = 𝒱 7 𝒱 9 0 0 0 0 𝒱 8 𝒱 10 0 0 0 0 ,
Ω ^ 41 = O ^ 51 O ^ 52 O ^ 53 O ^ 54 0 X 2 A η 0 0 , Ω ^ 42 = O 61 O ^ 62 O ^ 63 O 64 0 0 0 0 , Ω ^ 51 = O ^ 71 O ^ 52 O ^ 53 O ^ 54 0 0 0 0 , Ω ^ 52 = O 81 O ^ 62 O ^ 63 O 84 0 0 0 0 , Ω ^ 61 = D u G y C ( α ) D u G y ¯ C η D u G y D u G y ¯ σ y C ( α ) 0 σ y I 0 0 σ y ¯ C η 0 σ y ¯ I O 91 0 O 92 0 0 O 93 0 O 94 , 𝒱 1 = ( ( 1 χ ¯ ) X 1 B ( α ) B ( α ) Q y ) T 0 , 𝒱 2 = ( ( 1 χ ¯ ) X 1 B ( α ) B ( α ) Q y ¯ ) T 0 , 𝒱 3 = ( χ ^ X 1 B ( α ) B ( α ) Q y ) T 0 , 𝒱 4 = ( χ ^ X 1 B ( α ) B ( α ) Q y ¯ ) T 0 , 𝒱 5 = ( D u D u Q y ) T 0 0 0 0 , 𝒱 6 = ( D u D u Q y ¯ ) T 0 0 0 0 , 𝒱 7 = Q y 1 G y C ( α ) 0 Q y 1 G y 0 , 𝒱 8 = 0 Q y ¯ 1 G y ¯ C η 0 Q y ¯ 1 G y ¯ , 𝒱 9 = 0 Q y 1 G y 0 0 , 𝒱 10 = 0 0 Q y ¯ 1 G y ¯ 0 ,
O ^ 51 = X 1 A ( α ) + B ( α ) G y C ( α ) , O ^ 52 = B ( α ) G y ¯ C η , O ^ 53 = B ( α ) G y , O ^ 54 = B ( α ) G y ¯ , O ^ 62 = B ( α ) G y , O ^ 63 = B ( α ) G y ¯ , O ^ 71 = B ( α ) G y C ( α ) .
According to Lemma 1, we can infer that the inequality in (58) holds if
Ω 11 0 Ω 22 Ω 31 0 Ω 33 Ω ^ 41 Ω ^ 42 Ω 43 Ω 44 Ω ^ 51 Ω ^ 52 0 0 Ω 44 Ω ^ 61 Ω ^ 62 0 0 0 Ω 66 Ω 71 Ω 72 0 Ω 74 Ω 75 Ω 76 Ω 77 < 0
is satisfied, where
Ω 71 = G y C ( α ) 0 G y 0 0 G y ¯ C η 0 G y ¯ , Ω 74 = ( ( 1 χ ¯ ) X 1 B ( α ) B ( α ) Q y ) T 0 ( ( 1 χ ¯ ) X 1 B ( α ) B ( α ) Q y ¯ ) T 0 , Ω 75 = ( χ ^ X 1 B ( α ) B ( α ) Q y ) T 0 ( χ ^ X 1 B ( α ) B ( α ) Q y ¯ ) T 0 .
Furthermore, we can express the inequality in (59) as
j = 1 n α j ( ϑ ( k ) ) Q j < 0 .
By recalling the fact that α j ( ϑ ( k ) ) > 0 , we can obtain that inequality (60) holds if the inequalities in (50) are satisfied.
By considering the inequality in (23) combined with L y = Q y 1 G y , we can obtain that G y T Q y T Q y 1 G y < δ y 1 I , which can be reformulated as
I + G y T Q y T δ y I Q y 1 G y < 0 .
By utilizing the Schur complement to the condition obtained in (61), one is able to deduce that
I G y Q y δ y 1 I Q y T < 0
By taking Q y δ y 1 I Q y T Q y Q y T + δ y I into consideration, one is able to conclude that the condition in (62) is satisfied if the condition in (51) holds.
In the same manner, by considering the inequality in (24) combined with L y ¯ = Q y ¯ 1 G y ¯ , we have G y ¯ T Q y ¯ T Q y ¯ 1 G y ¯ < δ y ¯ 1 I , which can be expressed as
I + G y ¯ T Q y ¯ T δ y ¯ I Q y ¯ 1 G y ¯ < 0 .
Then, based on the Schur complement, from the condition obtained in (63), we are able to deduce that
I G y ¯ Q y ¯ δ y ¯ 1 I Q y ¯ T < 0
holds. In addition, according to the fact that Q y ¯ δ y ¯ 1 I Q y ¯ T Q y ¯ Q y ¯ T + δ y ¯ I , it can be concluded that the inequality in (64) can be guaranteed by the condition in (52).
This completes the proof. □
Remark 5.
By employing the decoupling strategy proposed in [14], the design conditions with regard to the desired static output feedback tracking controller are established in terms of linear matrix inequalities, which is quite distinct from the specific design strategies given in [31,32]. In addition, it should be noted that we do not need to restrict the system matrices during the design of the static output feedback tracking controller herein. It implies that the assumption that the output matrix C is of full row rank and common, as in [13], or the assumption that the input matrix B is of full column rank and common, as in [21], will not be required. Consequently, one is able to deduce that the controller design methodology in this paper is more general than the one in [13] or the one in [21].
Remark 6.
As pointed out in [4,6,16], in order to implement the designed quantized tracking control strategy, the dynamic parameter with regard to the quantizer will also be transmitted through the imperfect communication network to the decoder. According to the results in [6], the adjusting scheme with regard to the dynamic parameters ρ ς ( ς = y , y ¯ , u ) considered herein can be expressed as
ρ ς = ϖ × 10 , ς = y , y ¯ , u
where = min N | b 2 ς o ς | ς ( k ) | × 10 > 1 and ϖ = floor ( b 2 ς o ς | ς ( k ) | × 10 ) . Additionally, the function floor ( ) is utilized to stand for a maximum integer which is not greater than . In this way, on the side of the decoder, the desired dynamic parameters ρ ς ( ς = y , y ¯ , u ) will be received in the form of integers ( ϖ , ) .
Remark 7.
Based on the conclusion presented in [38], we are able to deduce that the numerical complexity of the linear matrix inequality conditions (49)–(52) developed in Theorem 2 hinges not only on the number of undetermined variables ℧ but also on the number of rows ð. Additionally, the linear matrix inequality conditions (49)–(52) proposed in Theorem 2 can be readily solved in polynomial time with complexity proportional to = 3 ð with = 2 + 1 2 n x ( n x + 1 ) + 1 2 n x ¯ ( n x ¯ + 1 ) + 2 n y ( n y + 1 ) + n x ¯ n x + n x n x + n x ¯ n x ¯ + 2 n u n y + 2 n u n u and ð = n x + n x ¯ + 2 n u + 2 n y + ( 3 n x + 3 n x ¯ + 8 n y + 5 n u + n w s + n η ) n .

4. Simulation Examples

In this part, we are going to provide two examples based on practical engineering to illustrate that the dissipative tracking control methodology presented herein is effective.
Example 1.
Firstly, the mass-spring system illustrated in Figure 2 will be adopted. According to [26], one is able to express its motion equation as
m s ¨ + 1 + 2 = ε
where m represents the mass, s represents the displacement from the reference point, ε indicates the external control input, 1 and 2 represent the viscous damping force and the spring restoring force, respectively. By recalling the results in [26], it can be obtained that 1 = c s ˙ and 2 = k s + k a 2 s 3 with c > 0 , k , and a standing for given scalars. Then, the equation in (65) can be expressed as
m s ¨ + c s ˙ + k s + k a 2 s 3 = ε
According to the results developed in [26,33], one is able to utilize a continuous-time T-S fuzzy model to represent the investigated mass-spring system in (66), which is indicated as
Rule 1 : IF ( x 1 2 ( t ) ) is s ¯ THEN x ˙ ( t ) = A s 1 x ( t ) + B s 1 u ( t ) Rule 2 : IF ( x 1 2 ( t ) ) is s ̲ THEN x ˙ ( t ) = A s 2 x ( t ) + B s 2 u ( t )
in which x 1 ( t ) = s , x 2 ( t ) = s ˙ , x 1 2 ( t ) [ s ̲ , s ¯ ] , and
A s 1 = 0 1 ( k + k a 2 s ¯ ) m c m , B s 1 = 0 1 m , A s 2 = 0 1 ( k + k a 2 s ̲ ) m c m , B s 2 = 0 1 m .
Moreover, the fuzzy membership functions can be constructed as α 1 ( x 1 2 ( t ) ) = ( [ x 1 2 ( t ) s ̲ ] / [ s ¯ s ̲ ] ) and α 1 ( x 1 2 ( t ) ) = 1 α 1 ( x 1 2 ( t ) ) .
By selecting the sampling period T = 0.50 s with s ̲ = 0 , s ¯ = 4 , m = 1 kg , c = 2 N · m / s , a = 0.3 m 1 , and k = 4 , it can be obtained that
A 1 = 0.5501 0.2502 1.3611 0.0497 , B 1 = 0.0827 0.2502 , A 2 = 0.6597 0.2668 1.0670 0.1262 , B 2 = 0.0851 0.2668 ,
and the other related matrices with regard to the T-S fuzzy model in (1) are presented as
E 1 = 0.0907 0.5171 , E 2 = 0.1006 1.2819 , C 1 = C 2 = 1 0 .
Additionally, we assume that
A η = 0.5 , B η = 0.1 , C η = 0.5 .
By applying Theorem 2 with β y = β y ¯ = 0.35 , J 11 = 0.5 , J 21 = 0.1 , J 22 = 0.1 , J 31 = 1 , J 32 = 0 , J 33 = 1 , γ = 0.9 , χ ¯ = 0.1 , D u = 0.05 , M ς = 50 and Δ ς = 0.1 for ς = y , y ¯ , u , we can obtain that
G y = 0.0421 , G y ¯ = 0.0225 , Q y = 0.3853 , Q y ¯ = 0.3868 , N 1 = 11.9345 , N 2 = 0.1284 , M 1 = 13.0658 , M 2 = 3.7446 .
Then, based on the equation in (53), we can know that L y and L y ¯ in (16) are calculated as L y = 0.1092 and L y ¯ = 0.0582 .
Next, by selecting the initial conditions x ( 0 ) = [ 1.0 1.0 ] T , x ¯ ( 0 ) = 1.0 , the disturbance input w s ( k ) = 0.6 cos ( 0.65 k ) e 0.15 k , the deception signal d u ( k ) = tanh ( 0.05 x 1 ( k ) ) , and the reference input η ( k ) = 10 sin ( 0.75 k ) e 0.15 k . Figure 3 depicts the responses of x 1 ( k ) and x 2 ( k ) . Figure 4 depicts the responses of y ( k ) and y ¯ ( k ) . Figure 5 depicts the response of u ( k ) . Figure 6 plots the response of e ( k ) . Figure 7, Figure 8 and Figure 9 depict the trajectories of the dynamic parameters ρ y , ρ y ¯ , and ρ u , respectively. Released intervals of the communication channel from the plant to the controller are shown in Figure 10. Released intervals of the communication channel from the reference model to the controller are shown in Figure 11.
Additionally, to further prove the effectiveness of the presented dissipative tracking control scheme, it is assumed that
w s ( k ) = 0.55 sin ( 0.66 k + 0.7 ) , 3 k 18 0 , otherwise η ( k ) = 4 , 4 k 20 1 , 20 < k 30 0 , otherwise .
Figure 12 displays the responses of y ( k ) and y ¯ ( k ) . Released intervals of the communication channel from the plant to the controller are shown in Figure 13. Released intervals of the communication channel from the reference model to the controller are shown in Figure 14.
According to the simulation results in Figure 3, Figure 4, Figure 5, Figure 6, Figure 7, Figure 8, Figure 9, Figure 10, Figure 11, Figure 12, Figure 13 and Figure 14, one is able to observe that the designed tracking controller satisfies the relational requirements, i.e., the considered mass-spring system with event-triggered communication scheme, dynamic quantization, and stochastic deception attacks can be stochastically stabilized by the designed tracking controller and has the given dissipative tracking performance.
Example 2.
To further illustrate that the dissipative tracking control methodology presented herein is effective, the continuous stirred tank reactor used in [38] will be considered. In the light of the results in [38], by selecting the sampling period T = 0.50 s , we can obtain
A 1 = 0.5861 0.0001 0.1515 0.5224 , B 1 = 0.0000 0.1103 , A 2 = 0.5861 0.0001 0.1518 0.5224 , B 2 = 0.0000 0.1103 , A 3 = 0.5860 0.0001 0.1522 0.5224 , B 3 = 0.0000 0.1103 ,
and the other related matrices with regard to the T-S fuzzy model in (1) are presented as
E 1 = E 2 = E 3 = 0.3 0.4 , C 1 = C 2 = C 3 = 0 1 .
Furthermore, we assume that
A η = 0.2 , B η = 0.1 , C η = 0.2 .
By applying Theorem 2 with β y = β y ¯ = 0.35 , J 11 = 0.5 , J 21 = 0.1 , J 22 = 0.1 , J 31 = 1 , J 32 = 0 , J 33 = 1 , γ = 0.9 , χ ¯ = 0.1 , D u = 0.05 , M ς = 10 and Δ ς = 0.1 for ς = y , y ¯ , u , we can obtain that
G y = 0.0232 , G y ¯ = 0.0048 , Q y = 1.3913 , Q y ¯ = 1.3887 , N 1 = 2.1736 , N 2 = 0.3144 , M 1 = 2.5870 , M 2 = 1.8515 .
Then, based on the equation in (53), we can know that L y and L y ¯ in (16) are calculated as L y = 0.0167 and L y ¯ = 0.0035 .
For simulation, it is supposed that the initial conditions x ( 0 ) = [ 1.0 1.5 ] T , x ¯ ( 0 ) = 1.5 , the deception signal d u ( k ) = tanh ( 0.05 x 1 ( k ) ) , and
w s ( k ) = 0.36 sin ( 0.02 k + 1.5 ) , 4 k 19 0 , otherwise η ( k ) = 10 , 5 k 20 1 , 20 < k 30 0 , otherwise .
Figure 15 displays the responses of y ( k ) and y ¯ ( k ) . Figure 16 plots the response of e ^ ( k ) .
Additionally, to further prove the effectiveness of the presented dissipative tracking control scheme, it is assumed that the initial conditions x ( 0 ) = [ 1.0 1.0 ] T , x ¯ ( 0 ) = 1.0 , the disturbance input w s ( k ) = 0.6 sin ( k + 0.4 ) , and the reference input η ( k ) = 10 sin ( k ) . Figure 17 displays the trajectories of y ( k ) and y ¯ ( k ) .
According to the simulation results in Figure 15, Figure 16 and Figure 17, one is able to observe that the designed event-based quantized security tracking controller satisfies the relational requirements, i.e., the considered continuous stirred tank reactor can be stochastically stabilized by the designed tracking controller and has the given dissipative tracking performance.
Finally, in order to demonstrate the employed event-triggered communication scheme herein is more general than the one utilized in [37], we are going to study the considered tracking control problem based on the event-triggered communication scheme proposed in [37]. In the presence of different M ς , Δ ς for ς = y , y ¯ , u , and χ ¯ , the minimum H tracking performances are displayed in Table 1, Table 2 and Table 3, respectively.
From Table 1, Table 2 and Table 3, one is able to conclude that the minimum H tracking performances acquired according to Theorem 2 are lower than the ones acquired based on the results in [37]. This means that the employed event-triggered communication scheme in this paper is superior. Furthermore, the minimum H tracking performance gradually decreases as the quantization range increases in Table 1, increases as the quantization error increases in Table 2, and increases as the network attack coefficient increases in Table 3, which is expected.
Comparative Explanations: In the presence of the event-triggered communication scheme, dynamic quantization, and stochastic deception attacks, the presented tracking control scheme can effectively solve the output feedback tracking control problem with regard to the mass-spring system as well as the continuous stirred tank reactor under the framework of linear matrix inequality. Compared with the existing results concerning tracking control, we are able to summarize the following two aspects of advantages regarding the presented event-based quantized security dissipative tracking control scheme:
(1)
In contrast the with the quantized tracking control problem addressed in [25,39], where only quantized input or multiple quantized outputs were considered, the tracking control problem with quantized input and outputs studied herein is more complicated. Additionally, for ς = y , y ¯ , u , the employed dynamic quantization scheme herein will be reduced to the one in [5,38,39] by setting b 1 ς = b 2 ς and will be reduced to the one in [16,34] by choosing b 1 ς = b 2 ς . As a result, the employed dynamic quantization scheme herein is more relaxed than the one in [5,16,34,38,39].
(2)
Based the simulation results in Figure 10, Figure 11, Figure 13, and Figure 14, one is able to conclude that the communication burden for the measurement outputs y ( k ) and y ¯ ( k ) was significantly reduced by introducing the event-triggered conditions given in (6) and (7), respectively. In contrast with the event-triggered communication scheme proposed in [23,35,36], where a specific event-triggered condition is utilized to reduce the communication burden of the augmented variable of the states, the one employed herein is more general. Additionally, the minimum H tracking performances displayed in Table 1, Table 2 and Table 3 illustrate that the employed event-triggered communication scheme herein is less conservative than the one utilized in [37].

5. Conclusions

In this paper, the problem of event-triggered dissipative fuzzy tracking control of nonlinear networked systems with dynamic quantization and stochastic deception attacks was studied. The nonlinear networked systems is approximated by a discrete-time T-S fuzzy model. To achieve the rational utilization of the limited communication and computation resources, both the event-triggered scheme and the dynamic quantization scheme with general online adjustment rule were introduced, and the stochastic deception attacks characterized by Bernoulli distribution was considered. By utilizing the matrix inequality decoupling approach, the sufficient conditions for the design of the desired static output feedback tracking controller were proposed in terms of linear matrix inequalities, which guarantee that the resulting system is stochastically stable and preserves the predefined dissipative tracking performance. The effectiveness of the proposed tracking control design scheme was demonstrated through two practical examples. It should be noted that privacy protection and communication protocols are also considered to be important problems for the study of networked systems. As a result, the problem of security event-triggered quantized tracking control for nonlinear networked systems subject to privacy protection and communication protocols is significant and deserves further investigation.

Author Contributions

Conceptualization, S.F., Z.L. and T.J.; Formal analysis, Z.L. and T.J.; methodology, S.F., Z.L. and T.J.; funding acquisition, Z.L.; investigation, writing—original draft preparation and editing, and writing—review and editing, S.F., Z.L. and T.J.; software, S.F. and T.J. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the Science and Technology Project of Hebei Education Department under Grant BJK2022053 and in part by the Langfang Youth Talent Support Program under Grant LFBJ202202.

Data Availability Statement

The original contributions presented in the study are included in the article; further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zhang, X.-M.; Han, Q.-L.; Ge, X.; Ding, D.; Ding, L.; Yue, D.; Peng, C. Networked control systems: A survey of trends and techniques. IEEE/CAA J. Autom. Sin. 2020, 7, 1–17. [Google Scholar] [CrossRef]
  2. Zhang, X.-M.; Han, Q.-L.; Ge, X. A novel approach to performance analysis of discrete-time networked systems subject to network-induced delays and malicious packet dropouts. Automatica 2022, 136, 110010. [Google Scholar] [CrossRef]
  3. Liberzon, D. Hybrid feedback stabilization of systems with quantized signals. Automatica 2003, 39, 1543–1554. [Google Scholar] [CrossRef]
  4. Niu, Y.; Ho, D.W.C. Control strategy with adaptive quantizer’s parameters under digital communication channels. Automatica 2014, 50, 2665–2671. [Google Scholar] [CrossRef]
  5. Chang, X.-H.; Xiong, J.; Li, Z.-M.; Park, J.H. Quantized static output feedback control for discrete-time systems. IEEE Trans. Ind. Inform. 2018, 14, 3426–3435. [Google Scholar] [CrossRef]
  6. Xiong, J.; Chang, X.-H.; Park, J.H.; Li, Z.-M. Nonfragile fault-tolerant control of suspension systems subject to input quantization and actuator fault. Int. J. Robust Nonlinear Control 2020, 30, 6720–6743. [Google Scholar] [CrossRef]
  7. Zheng, B.-C.; Yu, X.; Xue, Y. Quantized feedback sliding-mode control: An event-triggered approach. Automatica 2018, 91, 126–135. [Google Scholar] [CrossRef]
  8. Yang, H.; Xu, Y.; Zhang, J. Event-driven control for networked control systems with quantization and Markov packet losses. IEEE Trans. Cybern. 2017, 47, 2235–2243. [Google Scholar] [CrossRef] [PubMed]
  9. Shi, Y.; Nekouei, E. Quantization and event-triggered policy design for encrypted networked control. IEEE/CAA J. Autom. Sin. 2024, 11, 946–955. [Google Scholar] [CrossRef]
  10. Wu, C.; Zhao, X.; Wang, B.; Xing, W.; Liu, L.; Wang, X. Model-based dynamic event-triggered control for cyber-physical systems subject to dynamic quantization and DoS attacks. IEEE Trans. Netw. Sci. Eng. 2022, 9, 2406–2417. [Google Scholar] [CrossRef]
  11. Zhang, X.-M.; Han, Q.-L.; Zhang, B.-L.; Ge, X.; Zhang, D. Accumulated-state-error-based event-triggered sampling scheme and its application to control of sampled-data systems. Sci. China Inf. Sci. 2024, 67, 162206. [Google Scholar] [CrossRef]
  12. Zha, L.; Liao, R.; Liu, J.; Xie, X.; Tian, E.; Cao, J. Dynamic event-triggered output feedback control for networked systems subject to multiple cyber attacks. IEEE Trans. Cybern. 2022, 52, 13800–13808. [Google Scholar] [CrossRef] [PubMed]
  13. Dong, J.; Yang, G.-H. Static output feedback control of a class of nonlinear discrete-time systems. Fuzzy Sets Syst. 2009, 160, 2844–2859. [Google Scholar] [CrossRef]
  14. Chang, X.-H.; Zhang, L.; Park, J.H. Robust static output feedback control for uncertain fuzzy systems. Fuzzy Sets Syst. 2015, 273, 87–104. [Google Scholar] [CrossRef]
  15. Choi, H.D.; Ahn, C.K.; Shi, P.; Wu, L.; Lim, M.T. Dynamic output-feedback dissipative control for T-S fuzzy systems with time-varying input delay and output constraints. IEEE Trans. Fuzzy Syst. 2017, 25, 511–526. [Google Scholar] [CrossRef]
  16. Chang, X.-H.; Yang, C.; Xiong, J. Quantized fuzzy output feedback control for nonlinear systems with adjustment of dynamic parameters. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 2005–2015. [Google Scholar] [CrossRef]
  17. Shen, M.; Gu, Y.; Zhu, S.; Zong, G.; Zhao, X. Mismatched quantized output-feedback control of fuzzy Markov jump systems with a dynamic guaranteed cost triggering scheme. IEEE Trans. Fuzzy Syst. 2024, 32, 1681–1692. [Google Scholar] [CrossRef]
  18. Liu, J.; Wei, L.; Xie, X.; Tian, E.; Fei, S. Quantized stabilization for T-S fuzzy systems with hybrid-triggered mechanism and stochastic cyber-attacks. IEEE Trans. Fuzzy Syst. 2018, 26, 3820–3834. [Google Scholar] [CrossRef]
  19. Pan, Y.; Wu, Y.; Lam, H.-K. Security-based fuzzy control for nonlinear networked control systems with DoS attacks via a resilient event-triggered scheme. IEEE Trans. Fuzzy Syst. 2022, 30, 4359–4368. [Google Scholar] [CrossRef]
  20. Liu, Y.; Zhang, P.; Lee, S.; Xie, X. Observer-based adaptive event-triggered control for interval type-2 fuzzy systems under multiple cyber-attacks. IEEE Trans. Fuzzy Syst. 2024, 32, 2438–2447. [Google Scholar] [CrossRef]
  21. Yang, Y.; Wen, B.; Su, X.; Huang, J.; Liu, B. Sliding mode fuzzy control of stochastic nonlinear systems under cyber-attacks. IEEE Trans. Cybern. 2024, 54, 3174–3182. [Google Scholar] [CrossRef] [PubMed]
  22. Gao, H.; Chen, T. Network-based output tracking control. IEEE Trans. Autom. Control 2008, 53, 655–667. [Google Scholar] [CrossRef]
  23. Yan, H.; Hu, C.; Zhang, H.; Karimi, H.R.; Jiang, X.; Liu, M. output tracking control for networked systems with adaptively adjusted event-triggered scheme. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 2050–2058. [Google Scholar] [CrossRef]
  24. Liu, S.; Wei, G.; Song, Y.; Liu, Y. Error-constrained reliable tracking control for discrete time-varying systems subject to quantization effects. Neurocomputing 2016, 174, 897–905. [Google Scholar] [CrossRef]
  25. Li, Y.-X.; Yang, G.-H. Adaptive asymptotic tracking control of uncertain nonlinear systems with input quantization and actuator faults. Automatica 2016, 72, 177–185. [Google Scholar] [CrossRef]
  26. Lian, K.-Y.; Liou, J.-J. Output tracking control for fuzzy systems via output feedback design. IEEE Trans. Fuzzy Syst. 2006, 14, 628–639. [Google Scholar] [CrossRef]
  27. Dong, J.; Wang, S. Robust -tracking control design for T-S fuzzy systems with partly immeasurable premise variables. J. Frankl. Inst. 2017, 354, 3919–3944. [Google Scholar] [CrossRef]
  28. Wang, Y.; Karimi, H.R.; Lam, H.-K.; Yan, H. Fuzzy output tracking control and filtering for nonlinear discrete-time descriptor systems under unreliable communication links. IEEE Trans. Cybern. 2020, 50, 2369–2379. [Google Scholar] [CrossRef]
  29. Zeng, H.-B.; Zhu, Z.-J.; Peng, T.-S.; Wang, W.; Zhang, X.-M. Robust tracking control design for a class of nonlinear networked control systems considering bounded package dropouts and external disturbance. IEEE Trans. Fuzzy Syst. 2024, 32, 3608–3617. [Google Scholar] [CrossRef]
  30. Li, H.; Wu, C.; Jing, X.; Wu, L. Fuzzy tracking control for nonlinear networked systems. IEEE Trans. Cybern. 2017, 47, 2020–2031. [Google Scholar] [CrossRef]
  31. Zhang, D.; Han, Q.-L.; Jia, X. Network-based output tracking control for a class of T-S fuzzy systems that can not be stabilized by nondelayed output feedback controllers. IEEE Trans. Cybern. 2015, 45, 1511–1524. [Google Scholar] [CrossRef] [PubMed]
  32. Song, J.; Niu, Y.; Lam, J.; Lam, H.-K. Fuzzy remote tracking control for randomly varying local nonlinear models under fading and missing measurements. IEEE Trans. Fuzzy Syst. 2018, 26, 1125–1137. [Google Scholar] [CrossRef]
  33. Li, Z.-M.; Park, J.H. Dissipative fuzzy tracking control for nonlinear networked systems with quantization. IEEE Trans. Syst. Man Cybern. Syst. 2020, 50, 5130–5141. [Google Scholar] [CrossRef]
  34. Li, Z.; Lu, C.; Wang, H. Non-fragile fuzzy tracking control for nonlinear networked systems with dynamic quantization and randomly occurring gain variations. Mathematics 2023, 11, 1116. [Google Scholar] [CrossRef]
  35. Zhang, D.; Han, Q.-L.; Jia, X. Network-based output tracking control for T-S fuzzy systems using an event-triggered communication scheme. Fuzzy Sets Syst. 2015, 273, 26–48. [Google Scholar] [CrossRef]
  36. Gu, Z.; Yue, D.; Liu, J.; Ding, Z. tracking control of nonlinear networked systems with a novel adaptive event-triggered communication scheme. J. Frankl. Inst. 2017, 354, 3540–3553. [Google Scholar] [CrossRef]
  37. Li, Z.-M.; Chang, X.-H.; Park, J.H. Quantized static output feedback fuzzy tracking control for discrete-time nonlinear networked systems with asynchronous event-triggered constraints. IEEE Trans. Syst. Man Cybern. Syst. 2021, 51, 3820–3831. [Google Scholar] [CrossRef]
  38. Li, Z.-M.; Chang, X.-H.; Xiong, J. Event-based fuzzy tracking control for nonlinear networked systems subject to dynamic quantization. IEEE Trans. Fuzzy Syst. 2023, 31, 941–954. [Google Scholar] [CrossRef]
  39. Liu, X.-M.; Chang, X.-H. Adaptive event-triggered tracking control for nonlinear networked systems with dynamic quantization and deception attacks. Int. J. Robust And Nonlinear Control 2024, 34, 8311–8333. [Google Scholar] [CrossRef]
  40. Chen, Y.; Lu, C.; Zhang, X.-M. Allowable delay set flexible fragmentation approach to passivity analysis of delayed neural networks. Neurocomputing 2025, 629, 129730. [Google Scholar] [CrossRef]
Figure 1. Schematic of event-based quantized cyber attack tracking control.
Figure 1. Schematic of event-based quantized cyber attack tracking control.
Processes 13 01902 g001
Figure 2. Diagram of mass-spring system.
Figure 2. Diagram of mass-spring system.
Processes 13 01902 g002
Figure 3. Responses of x 1 ( k ) and x 2 ( k ) .
Figure 3. Responses of x 1 ( k ) and x 2 ( k ) .
Processes 13 01902 g003
Figure 4. Responses of y ( k ) and y ¯ ( k ) .
Figure 4. Responses of y ( k ) and y ¯ ( k ) .
Processes 13 01902 g004
Figure 5. Response of u ( k ) .
Figure 5. Response of u ( k ) .
Processes 13 01902 g005
Figure 6. Response of e ^ ( k ) .
Figure 6. Response of e ^ ( k ) .
Processes 13 01902 g006
Figure 7. Trajectory of the dynamic parameter ρ y .
Figure 7. Trajectory of the dynamic parameter ρ y .
Processes 13 01902 g007
Figure 8. Trajectory of the dynamic parameter ρ y ¯ .
Figure 8. Trajectory of the dynamic parameter ρ y ¯ .
Processes 13 01902 g008
Figure 9. Trajectory of the dynamic parameter ρ u .
Figure 9. Trajectory of the dynamic parameter ρ u .
Processes 13 01902 g009
Figure 10. Released intervals of communication channel from plant to controller.
Figure 10. Released intervals of communication channel from plant to controller.
Processes 13 01902 g010
Figure 11. Released intervals of communication channel from reference model to controller.
Figure 11. Released intervals of communication channel from reference model to controller.
Processes 13 01902 g011
Figure 12. Responses of y ( k ) and y ¯ ( k ) .
Figure 12. Responses of y ( k ) and y ¯ ( k ) .
Processes 13 01902 g012
Figure 13. Released intervals of communication channel from plant to controller.
Figure 13. Released intervals of communication channel from plant to controller.
Processes 13 01902 g013
Figure 14. Released intervals of communication channel from reference model to controller.
Figure 14. Released intervals of communication channel from reference model to controller.
Processes 13 01902 g014
Figure 15. Responses of y ( k ) and y ¯ ( k ) .
Figure 15. Responses of y ( k ) and y ¯ ( k ) .
Processes 13 01902 g015
Figure 16. Response of e ^ ( k ) .
Figure 16. Response of e ^ ( k ) .
Processes 13 01902 g016
Figure 17. Responses of y ( k ) and y ¯ ( k ) .
Figure 17. Responses of y ( k ) and y ¯ ( k ) .
Processes 13 01902 g017
Table 1. Minimum H tracking control performances with different M ς ( Δ ς = 0.5, χ ¯ = 0.3).
Table 1. Minimum H tracking control performances with different M ς ( Δ ς = 0.5, χ ¯ = 0.3).
M ς ( ς = y , y ¯ , u )1030507090
Theorem 20.64960.63410.63270.63230.6321
[37]0.67460.63960.63770.63730.6372
Table 2. Minimum H tracking control performances with different Δ ς ( M ς = 10, χ ¯ = 0.3).
Table 2. Minimum H tracking control performances with different Δ ς ( M ς = 10, χ ¯ = 0.3).
Δ ς ( ς = y , y ¯ , u )0.10.30.50.70.9
Theorem 20.63270.63870.64960.66510.6849
[37]0.63770.64870.67460.71800.7804
Table 3. Minimum H tracking control performances with different χ ¯ ( M ς = 10, Δ ς = 0.5).
Table 3. Minimum H tracking control performances with different χ ¯ ( M ς = 10, Δ ς = 0.5).
χ ¯ 0.30.40.50.60.7
Theorem 20.64960.64990.65070.65220.6544
[37]0.67460.67480.67560.67710.6793
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Fang, S.; Li, Z.; Jiang, T. Event-Based Dissipative Fuzzy Tracking Control for Nonlinear Networked Systems with Dynamic Quantization and Stochastic Deception Attacks. Processes 2025, 13, 1902. https://doi.org/10.3390/pr13061902

AMA Style

Fang S, Li Z, Jiang T. Event-Based Dissipative Fuzzy Tracking Control for Nonlinear Networked Systems with Dynamic Quantization and Stochastic Deception Attacks. Processes. 2025; 13(6):1902. https://doi.org/10.3390/pr13061902

Chicago/Turabian Style

Fang, Shuai, Zhimin Li, and Tianwei Jiang. 2025. "Event-Based Dissipative Fuzzy Tracking Control for Nonlinear Networked Systems with Dynamic Quantization and Stochastic Deception Attacks" Processes 13, no. 6: 1902. https://doi.org/10.3390/pr13061902

APA Style

Fang, S., Li, Z., & Jiang, T. (2025). Event-Based Dissipative Fuzzy Tracking Control for Nonlinear Networked Systems with Dynamic Quantization and Stochastic Deception Attacks. Processes, 13(6), 1902. https://doi.org/10.3390/pr13061902

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Article metric data becomes available approximately 24 hours after publication online.
Back to TopTop