On stability for hybrid system under stochastic perturbations

pdf
Số trang On stability for hybrid system under stochastic perturbations 9 Cỡ tệp On stability for hybrid system under stochastic perturbations 413 KB Lượt tải On stability for hybrid system under stochastic perturbations 0 Lượt đọc On stability for hybrid system under stochastic perturbations 0
Đánh giá On stability for hybrid system under stochastic perturbations
5 ( 12 lượt)
Nhấn vào bên dưới để tải tài liệu
Để tải xuống xem đầy đủ hãy nhấn vào bên trên
Chủ đề liên quan

Nội dung

VNU Journal of Science: Mathematics – Physics, Vol. 37, No. 1 (2021) 82-90 Original Article On Stability for Hybrid System under Stochastic Perturbations Cao Tan Binh1,*, Ta Cong Son2 1 Quy Nhon University, 170 An Duong Vuong, Quy Nhon, Vietnam 2 VNU University of Science, 334 Nguyen Trai, Hanoi, Vietnam Received 13 May 2020 Revised 22 July 2020; Accepted 30 August 2020 Abstract: The aim of this paper is to find out suitable conditions for almost surely exponential stability of communication protocols, considered for nonlinear hybrid system under stochastic perturbations. By using the Lyapunov-type function, we proved that the almost surely exponential stability remain be guaranteed as long as a bound on the maximum allowable transfer interval (MATI) is satisfied. Keywords: Networked Control System, almost surely exponential stability, maximum allowable transfer interval, Lyapunov function. 1. Introduction In recent years, Networked Control Systems (NCS) were addressed strongly in the control community because of its extensive applications in wireless as well as wireline. The pioneering papers were proposed by Walsh, Beldiman and Bushnell [10, 11, 12]. They introduced about stability of control systems with deterministic protocol. More recently, quite many articles and literatures referred to study stability of hybrid systems by specifically showing the Lyapunov-type function and bounds on the maximum allowable transfer interval (MATI), see [1, 2, 3, 4, 8, 6, 9, 13] for more details. This paper is divided into two sections. Beside Introduction, we state Preliminary and main problem in the second section. ________ Corresponding author. Email address: caotanbinh@qnu.edu.vn https//doi.org/ 10.25073/2588-1124/vnumap.4522 82 C.T. Binh, T.C. Son / VNU Journal of Science: Mathematics – Physics, Vol. 37, No. 1 (2021) 82-90 83 In [5], the authors solved entirely for researching the stable types of solution of hybrid systems, modelled as follows: x(t )  f ( x(t ), e(t )), t  (tk , tk 1 ), (1a ) e(t )  g ( x(t ), e(t )), t  (tk , tk 1 ), (1b )  (t )  1, t  (tk , tk 1 ), (1c )  k  (t )  0, (1d )  k x(t )  x(tk ), (1e) e(tk )  bk h(k , e(tk ))  (1  bk )e(tk ), k  0,1, 2,... (1 f ) Remind here that the variable bk belongs to the set 0,1 . If bk  1 then transmission is successful, and the protocol h determines the updated error. While if bk  0 then the error remains unchanged at the tk . We get a sequence (bk )k . Let S : 0,1 and the probability space (S , Fb , P) with the sequence space S : (bk )k : bk  S , k   where the σ-algebra Fb : 2S  2S  ... and the probability P satisfying P(b  S : bk  1)  p, k  . We also assume that the random variables bk are independently and identically distributed. Motivated from this paper, we concern to hybrid system in which exogenously stochastic perturbation is a Wiener process. This is, up to now, one of proposed problems remain have not been solved yet. To solve the problem, we make use of tools as introduced in [5] by defining  MATI or choosing the Lyapunov function W for protocol. We also, of course, use other tools for stochastic stability from [7] in order to support our proof. 2. Preliminary and main result Let us now consider the perturbed hybrid system that is of form dx(t )  f1 ( x(t ), e(t ))dt  f 2 ( x(t ), e(t ))dw(t ), t  (t k , t k 1 ), (2 a ) de(t )  g1 ( x(t ), e(t ))dt  g 2 ( x(t ), e(t ))dw(t ), t  (t k , t k 1 ), (2b)  (t )  1, t  (tk , tk 1 ), (2c )  k  (t )  0, (2 d )  k x(t )  x(tk ), (2e) e(tk )  bk h(k , e(tk ))  (1  bk )e(tk ), k  0,1, 2,... (2 f ) where x  n is the state of the system, e n is the error at the controller, h is the update function that models the particular protocol, τ is a timer to constrain both the transmission interval and the C.T. Binh, T.C. Son / VNU Journal of Science: Mathematics – Physics, Vol. 37, No. 1 (2021) 82-90 84 transmission delay, and w(t) is a Wiener process. In this paper, suppose that f1 , f 2 , g1 and g 2 satisfy Lipschitz and linear growth conditions which guarantee the existence and uniqueness of the solution of (2). Assume furthermore that k f1 (0,0)  f 2 (0,0)  g1 (0,0)  g2 (0,0) and h(k ,0)  0 for all . So system (2) has the solution ξ(t) := (x(t); e(t)) = (0,0) corresponding to the initial value  * : ( x* , e* )  (0,0) . Now, we introduce the concept of almost surely exponential stability, which can be found in Mao [7]. Definition 1 Consider the system (2). The solution  *  ( x* , e* )  (0,0) of (1) is called almost surely exponentially stable, if for all  0 1 limsup log  (t ,0, 0 , b)  0 , almost surely. t t  We need the following assumptions for the stability of network and system. Assumption (A1) The probability p  (0,1) of successful transmission of the k-th sampling time is identical for all k  and independent of k  . Assumption (A2) The stochastic perturbations b and w are mutually independent. Put Fb is the σ-algebra generated by (bk )k , and Fw is the σ-algebra generated by w(t)t0 . The system (2) defined on a probability space (Ω, F, P) where F   Fb  Fw  . Hereafter, we use notation Eb (.) instead of Eb (.| Fb ) and Ew (.) instead of Ew (.| Fw ) . Assumption (A3) Lyapunov functions for the protocol and the perturbed system. (i) There exist constants 0  a1 , a2 , 0 < λ < 1 such that for all e a1 e  W(e)  a 2 e 2 n : 2 (3) W (h(k , e))  W (e) . (4) (ii) The evolution of Lyapunov function W is bounded in the sense that there exist a constant   0,   and a continuous function H : n   such that for all x, e n : W W T .g1 ( x, e)  , g1 ( x, e)  2W (e)   H ( x) e e (iii) There exist a C 2 Lyapunov function V and constants b1 , b2 , b3  0 such that for all x, e b1 x  V ( x)  b2 x 2 LV ( x) : where 2 V 1  2V . f1 ( x, e)  f 2T ( x, e). 2 . f 2 ( x, e)  b3V ( x) , x 2 x (5) n (6) (7) C.T. Binh, T.C. Son / VNU Journal of Science: Mathematics – Physics, Vol. 37, No. 1 (2021) 82-90 fiT ( x, e)   fi (1) fi ( n)  is the transpose of fi ( x, e)  n , i  1,2 giT ( x, e)   gi(1) gi( n)  is the transpose of gi ( x, e)  n , i  1,2   2V   x1x1 2 V  Vxx :  x 2  2  V  x x  n 1 V  V  x  x1   2V  2V    x1xn   x1e1 2 2  ,  V   V :  xe ex  2   2V   V   x e xn xn  nn  n 1 85  2V   x1en     2V  xn en  nn V T V V T V  V . f1 ( x, e)  , f1 ( x, e) , .g1 ( x, e)  , g1 ( x, e) . , x e e xn  x Here,  MATI follows from the equation   2   ( 2  1), (0)   1 . (8) We choose τ(η) such that for all   0, ( ) we have  ( )   , 1  , (9) see [5] for more details. Theorem 2 Consider the system (2). Assume that (A1), (A2) and (A3) hold. If there exist   (0,1) and γ > 0 as defined in (8) satisfying g2T ( x, e).  2W .g 2 ( x, e)  2 (2  b3 )W (e) -  H ( x)  for almost all x, e e2 n (10) then the solution  *  (0,0) of system (2) is almost surely exponentially stable. Proof: We first assume that system (2a), (2b) is almost surely exponentially stable. Consider Lyapunov-type function U ( , )  U ( x, e, ) : V ( x)   ( )W (e) . (11) It follows that b1 x  V ( x)  b2 x , a1 e  W(e)  a 2 e ,   ( )  2 2 2 2 1  . We yield b1 x   a1 e  U ( x, e, )  V ( x)   ( )W(e)  b2 x   1a2 e 2 2 2 2 and m 2  m ( x, e)  U ( x, e, )  M ( x, e)  M  2 where m  min b1 ,  a1 , M  max b2 ,  1a2  . By Ito’s formula and Assumption (A3), we can derive that 2 2 (12) C.T. Binh, T.C. Son / VNU Journal of Science: Mathematics – Physics, Vol. 37, No. 1 (2021) 82-90 86  U U U 1  2U  2U dx  de  d   f 2T ( x, e). 2 . f 2 ( x, e)  g 2T ( x, e). 2 .g 2 ( x, e)  dt x e  2 x e  V W   f1 ( x, e)dt  f 2 ( x, e)dw   ( )  g1 ( x, e)dt  g 2 ( x, e)dw x e 2  1 V  2W   ( )W (e) dt   f 2T ( x, e). 2 . f 2 ( x, e)   ( ) g 2T ( x, e). 2 .g 2 ( x, e)  dt 2 x e  dU ( x, e, )  (13)   W 1  2W  LV ( x)dt   ( ) .g1 ( x, e)   ( )W (e)   ( ) g 2T ( x, e). 2 .g 2 ( x, e)  dt e 2 e   W  V    . f 2 ( x, e)   ( ) .g 2 ( x, e)  dw e  x  and W 1  2W .g1 ( x, e)   ( )W (e)   ( ) g 2T ( x, e). 2 .g 2 ( x, e) e 2 e W 1  2W   ( ) .g1 ( x, e)    2 ( )   ( 2 ( )  1)  W (e)   ( ) g 2T ( x, e). 2 .g 2 ( x, e) e 2 e  ( ) (5),(8),(10)   ( )  2W (e)   H ( x)   2 ( )W (e) -  2  2 ( )  1 W (e)   ( )  (2  b3 )W (e)   H ( x)   (14) 2 ( )W (e)   ( ) H ( x)  2 ( )W (e)    ( )W (e)   W (e) 2 2 2   ( )  (    b3 )W (e)   H ( x)  (9)    ( )b3W (e). Therefore (7),(14) W  V  dU ( x, e, )   b3V ( x)dt   ( )b3W (e)dt   . f 2 ( x, e)   ( ) .g 2 ( x, e)  dw e  x  W  V   b3U ( x, e, )dt   . f 2 ( x, e)   ( ) .g 2 ( x, e)  dw.  x  e   (15) This implies dEw U ( x, e, )  b3 Ew U ( x, e, ) dt . (16) For each k = 1,2,…, integrating both sides of (16) from tk1 to tk , we get Ew U ( x(tk , b), e(tk , b), (tk ))  Ew U ( x(tk1 , b), e(tk1 , b), (tk1 ))     Ew  b3U ( x, e, )  dt tk tk 1  Ew U ( x(tk1 , b), e(tk1 , b), (tk1 ))  . If at time tk transmission is successful, i.e. if bk  1 , then U ( x(tk , b), e(tk , b), (tk ))  V ( x(tk , b))   2 ( (tk ))W (e(tk , b)). (17) C.T. Binh, T.C. Son / VNU Journal of Science: Mathematics – Physics, Vol. 37, No. 1 (2021) 82-90 87 On the other hand if transmission fails, i.e. if bk  0 then U ( x(tk , b), e(tk , b), (tk ))  V ( x(tk , b))   2 ( (tk ))W (e(tk , b)). These give   Eb Ew U ( x(tk , b), e(tk , b), (tk )) ( x(tk , b), e(tk , b))   p Ew V ( x(tk , b))    2  ( (tk )) Ew W (e(tk , b))  (18)  (1  p) Ew V ( x(tk , b))    2 ( (tk )) Ew W (e(tk , b))   Ew U ( x(tk , b), e(tk , b), (tk ))    Ew W (e(tk , b))  where  : 1  (1  p  p ) 2 . From (16) it follows that Ew U ( (t , b), (t ))  Ew U ( x(t , b), e(t , b), (t ))  e b3 (t tk ) Ew U ( (tk , b), (tk ))  . Taking expectation in b, we obtain   eb3t Eb Ew U ( (t , b), (t ))  eb3tk Eb Ew U ( (tk , b), (tk ))  and  (19)    0  eb3tk Eb Ew U ( (tk , b), (tk ))   eb3tk Eb Ew U ( (tk , b), (tk ))  (tk , b)  (17),(18)  MEw 0 2 (20) k    eb3ti Eb Ew W (e(ti , b)). i 0 From (12), (19) and (20), it follows that meb3t Eb Ew  (t , b)   eb3t Eb Ew U ( (t , b), (t ))     eb3tk Eb Ew U ( (tk , b), (tk ))   MEw 0 . 2 Hence Eb Ew  (t , b)   M 2 Ew 0 eb3t , t  0. m (21) From the system (2), we have t t tk tk x(t )  x(tk )   f1ds   f 2 dw(s) and t t tk tk e(t )  e(tk )   g1ds   g 2 dw(s) . In addition, the conditions constant K such that f1 (0,0)  f 2 (0,0)  g1 (0,0)  g2 (0,0) 2 2 2   f1 ( x, e)  f 2 ( x, e)  K ( x, e)  2 2 2   g1 ( x, e)  g 2 ( x, e)  K ( x, e) lead to exist a positive (22) C.T. Binh, T.C. Son / VNU Journal of Science: Mathematics – Physics, Vol. 37, No. 1 (2021) 82-90 88 Therefore, we obtain Ew x(t )  3  Ew x 2 (tk )  Ew (  f1ds) 2  Ew (  f 2 dw( s)) 2  tk tk   t 2 t t t  3  Ew x 2 (tk )  (t  tk )  Ew f12 ds   Ew f 22 ds  tk tk   t t 2 2  3  Ew x 2 (tk )   K  Ew  ( s ) ds  K  Ew  ( s ) ds    tk tk (22) t 2  3  Ew x 2 (tk )  (  1) K  Ew  ( s) ds    tk and t 2 2 Ew e(t )  3  Ewe2 (tk )  (  1) K  Ew  (s) ds  .  tk  As a result Ew  2 t 2 2 2 2 2  Ew ( x, e)  Ew x(t )  Ew e(t )  3  Ew  (tk )  2(  1) K  Ew  ( s) ds  .   tk Hence tk 1  2 2 2 Eb  sup Ew  (t , b)   3  Eb Ew  (tk , b)  2(  1) K  Eb Ew  ( s, b) ds   t k    tk t tk 1  tk 1 2 2 M   3  Ew 0 e  b3tk  2(  1) K  Ew  0 e b3 s ds  t k m   2 M 2  3 1  K (  1)(1  eb3  )  Ew 0 e  b3tk 1 b m 3    b3tk 1  Ce , where  2 M 2 C  3 1  K (  1)(1  eb3  )  Ew 0 .  b3 m Applying Chebyshev’s inequality, we get b  3 tk 1   2 P  b : sup Ew  (t , b)  e 2    tk t tk 1   2 Eb  sup Ew  (t , b)  t  t  t  k k 1  e  Ce  b3 tk 1 2  b3 tk 1 2 . Since t0  0 and 0    tk 1  tk   , it is clear that  e  b3 tk 1 2  b3 t1 2  b3 ( t1 t0 ) 2 e e  b3 t2 2   k 0 e e  b3 ( t2 t1  t1 t0 ) 2   . (23) C.T. Binh, T.C. Son / VNU Journal of Science: Mathematics – Physics, Vol. 37, No. 1 (2021) 82-90 89 Using Borel-Cantelli’s lemma argument (see Mao [7]) to conclude that there exist a set 1 with P(1 )  1 and an integer-value random variable k0 such that for every b 1 we have sup Ew  (t , b)  e 2  b3 tk 1 2 tk t tk 1 , k  k0 (b). (24) That means Ew  (t , b)  e 2  b3 tk 1 2 , t  (tk , tk 1 ), k  k0 (b). Similarly to argument as above, using Borel-Cantelli’s lemma again, there exist a set  2 with P(2 )  1 and an integer-value random variable k1 such that for every w2 we have  (t , b)  e 2  b3 tk 1 2 , t  (tk , tk 1 ), k  k1 (w). (25) Let kc  max k0 , k1 , 0  1  2 , we have P(0 )  1 and  (t , b)  e 2  b3 tk 1 2 , t  (tk , tk 1 ), k  kc (w),(b, w) 0 . (26) Consequently b 1 limsup log ( (t ), b)   3  0. t 8 t  (27) The proof is completed. Remark 3 The inequalities (5) and (10) are existent. In fact, we choose g1 ( x, e)  g2 ( x, e)  e , W (e)  e   e12  e22  1/ 2 and   0 . Then we have 1/ 2 W W T .g1 ( x, e)  , g1 ( x, e)   e12  e22   2W (e),   0, e e Moreover, g 2T .  2W (e) .g 2  0  2(2  b3 )W (e) , e2 as long as 2  b3  0. References [1] D. Carnevale, A. R. Teel, D. Nesic, Further results on stability of networked control systems: a lyapunov approach, In 2007 American Control Conference, IEEE. (2007) 1741-1746. [2] D. Carnevale, A. R. Teel, D. Nesic, A Lyapunov proof of an improved maximum allowable transfer interval for networked control systems, IEEE Transactions on Automatic Control. 52 (2007) 892-897. [3] D. Christmann, On the behavior of black bursts in tick-synchronized networks, Techn. Ber. 337 (2010). 90 C.T. Binh, T.C. Son / VNU Journal of Science: Mathematics – Physics, Vol. 37, No. 1 (2021) 82-90 [4] M. B. Cloosterman, N. Van de Wouw, W. P. M. H. Heemels, H. Nijmeijer, Stability of networked control systems with uncertain time-varying delays, IEEE Transactions on Automatic Controll. 54 (2009) 1575-1580. [5] L. H. Duc, D. Christmann, R. Gotzhein, S. Siegmund, F. Wirth, The stability of try-oncediscard for stochastic communication channels: Theory and validation, In 2015 54th IEEE Conference on Decision and Control (CDC). (2015) 4170-4175. [6] W. P. M. H. Heemels, D. Nesic, A. R. Teel, N. Van de Wouw, Networked and quantized control systems with communication delays, In Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference. (2009) 7929-7935. [7] X. Mao, Stochastic differential equations and applications, Elsevier, 2007. [8] D. Nesic, D. Liberzon, A unified framework for design and analysis of networked and quantized control systems, IEEE Trans. Automatic Control. 54 (2009) 732-747. [9] P. Naghshtabrizi, J. P. Hespanha, A. R. Teel, Stability of delay impulsive systems with application to networked control systems, Transactions of the Institute of Measurement and Control. 32 (2010), 511-528. [10] G. C. Walsh, O. Beldiman, L. G. Bushnell, Asymptotic behavior of nonlinear networked control systems, IEEE transactions on automatic control. 46 (2001) 1093-1097. [11] G. C. Walsh, O. Beldiman, L. G. Bushnell, Error encoding algorithms for networked control systems, Automatica. 38 (2002) 261-267. [12] G. C. Walsh, H. Ye, L. G. Bushnell, Stability analysis of networked control systems, IEEE transactions on control systems technology. 10 (2002) 438-446. [13] L. Zhang, Y. Shi, T. Chen, B. Huang, A new method for stabilization of networked control systems with random delays, IEEE Transactions on automatic control. 50 (2005) 1177-1181.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.