Probability-Density-Dependent Load Frequency Contr
Probability-Density-Dependent Load Frequency Contr
instance [15], [16], are accomplished based on the interval introduced in developing the model and obtaining the stability
time-varying delay method and boundary information of the and synthesis conditions.
communication delay. It is worthy noting that the time-varying 1) Since the existing methods [15], [25], [26] based on an
communication delays in [15], [16] are assumed to be with a interval time-varying delay model do not take into account
uniform distribution. Practically, for a real TCP/IP-based com- the probability distribution of random delay, how to model the
munication network, communication delay often has stochastic random delay by making use of the distribution information
properties. Generally speaking, it is usually distributed with is the first challenging problem.
some probabilistic features [17]–[19]. Thus, the uniform dis- 2) Considering the first challenging problem, a new dis-
tribution assumption without using these features may yield tributed delay model with the kernel representing the delay
conservative results. Considering the inter features of the distribution will be proposed in this paper. However, the exist-
communication delay in system analysis/synthesis, less con- ing method [29] based on Legendre polynomials to handle this
servative conditions are expected to be obtained. As a fact, the new model will cause approximation error and further lead to
probability density is more specific and precise for depicting conservative results. Thus, how to remove such approximation
the random delay. error and reduce conservativeness is the second challenging
On the other hand, the security of communication network problem.
that is vulnerable to be wrecked by hackers is very impor- 3) There exist stochastic transmission delays when the
tant for NPSs. If the remote control signals transmitted over attackers inject attack signals into network, therefore, how to
the network are injected by some false data, the NPS will model and deal with the deception attack will also bring the
be difficult to be maintained at the nominal state. Over the challenging problem similar with handling the random delay.
past decade, much attention has been paid to the control To solve these challenging issues, the main contributions of
problem against cyber-attacks, such as Denial-of-service (DoS) this work are given below:
attack [21], [22], deception attack [23], [24]. Concretely speak- 1) To make efficient use of the stochastic feature of the
ing, a resilient event-triggered LFC approach for NPSs subject network-induced transmission delay, a novel distributed delay
to DoS attack with finite energy is addressed in [20]. Different model with kernel is established, where the kernel is used
from DoS attack by blocking the connections of nets, decep- to represent the delay probability density. To model the ran-
tion attack aims to change the real value of control signal dom deception attacks, not only the stochastic feature induced
by injecting a false data, which makes it more deceptive. by attacker, but also the stochastic feature caused by random
Considering multi-area NPSs with time-varying communica- delays are considered in this paper. Then, a new representa-
tion delay and deception attack, a resilient LFC approach is tion of random delay and deception attack is proposed for the
addressed in [25], in which the deception attack is described first time. This model is more general than the traditional one
as a time-varying delay-dependent function. Reference [26] based on interval time-varying delay method [15], [25], [26].
studies the H∞ LFC issue of multi-area NPSs with DoS 2) In the existing result [29], the distributed delay with
attack and deception attack, which is also modeled as a kernel is approximated by Legendre polynomials and han-
time-varying delay-dependent function. In [25], [26], the time- dled by Bessel-Legendre inequality, which could lead to
varying delay-dependent deception attack model is established approximation error and design conservativeness. To solve this
only by using the bounds of delays. Compared to the con- problem, the distributed kernel is utilized directly to construct
ventional interval time-varying delay method, using not only a new Lyapunov-Krasovskii functional (LKF) in this paper.
the upper and lower bounds, but also the delay probability An integral inequality based on the kernel is used to deal with
distribution is potential for obtaining less conservative results. the distributed delay term directly without any approximation
It is known that testing the effectiveness of control strategies error. Then, new sufficient and less conservative conditions
in some practical systems is costly and difficult. Therefore, it formed by linear matrix inequalities (LMIs) are derived to
is worthy to develop suitable hardware simulators for some design the decentralized H∞ secure controller.
real control systems. Due the fact that many control devices The organization of this paper is provided as follows. The
of practical systems are executed by electrical equipments, it is preliminaries of modeling the closed-loop NPS is given in
natural and reasonable to transform the physical systems into Section II. Then the stability and controller design conditions
analogy circuits to verify the validity of control method and are obtained in Section III. Some simulation results are imple-
save the testing cost. For instance, a circuital implementation mented in Section IV. Section V summaries the conclusions
method is studied to convert the robust adaptive fault tolerant and presents some future investigations.
control schemes into electrical circuits in [27]. For uncertain Notation: In this paper, we define He(A) = A + AT . ⊗
nonlinear multi-agent systems with actuator faults, the adaptive a
means the Kronecker product. Sy(A, B) BT AB. denotes
control issue is developed and its circuital realization is studied b
in [28]. a!
.
Based on the above motivations, this article addresses the (a − b)!b!
H∞ load frequency regulation of NPSs with random delays
and cyber-attacks in a decentralized method. A circuital real-
ization approach is proposed to simulate the dynamics of II. P RELIMINARIES
power system components and the controller via equivalent In the LFC problem of power systems, there exist some
analogy circuits. The following new challenging problems are complicate nonlinear dynamics. Due to the fact that the load
YAN et al.: PROBABILITY-DENSITY-DEPENDENT LFC OF POWER SYSTEMS 4839
⎧ where Ki = [KPi KIi ] and KPi , KIi are the PI controller gains
⎪
⎨ Governor : Ggi (s) = 1+sTgi ,
1
to be designed.
Turbine : Gti (s) = 1+sTti ,
1 When the control signal is transmitted over the communi-
⎪
⎩ Power generator : cation network, it is highly possible that the transmitted signal
Gpi (s) = Di +sMi .
1
is delayed and damaged by sudden congestion and malicious
attackers. Considering these factors, the output of controller
where Tgi , Tti , Di , Mi and Rgi are the governor and tur-
with delay and deception attack is represented as
bine time constants, damping coefficient, inertia moment
of generator and droop coefficient of the ith control area, uai (t) = Ki Ci xi (t − τ (t)) + λ(t)Ki ϕi (t − τ (t)), (5)
respectively.
where τ (t) ∈ [0, h] means the random transmission delay; h
In this paper, following the above linearization method,
is the upper bound of the delay; λ(t) ∈ {0, 1} is a Bernoulli
the structure of the linear dynamic model of the ith control
variable to describe the occurrence of deception attack by
area in a multi-area NPS is illustrated in Fig. 1. Let fi (t),
λ(t) = 1 and no attack λ(t) = 0; the mathematical expec-
Ptie−i (t), Pgi (t), Pti (t) and Pdi (t) represent the devi-
tations of λ(t) = 1 and λ(t) = 0 are E{λ(t) = 1} = λ̄ and
ations of system frequency, tie-line power exchange, valve
E{λ(t) = 0} = 1 − λ̄, respectively.
position, mechanical output of turbine and load disturbance
In some existing results [8], [26], the deception attack is
of the ith control area, respectively. Then, the differential
usually bounded and modeled by a Lipschitz nonlinear func-
equations to describe the system dynamics of the ith control
tion related with system state or output. Following the same
area [6], [25] are given as:
way in [8], [26], the deception signal ϕi (t) is assumed to satisfy
⎧
⎪ ḟi (t) = M1 i (Pti (t) − Pdi (t) ϕi (t)2 ≤ Hi Ci xi (t)2 , (6)
⎪
⎪
⎪
⎪
⎨ −Ptie−i (t) −
⎪ D f (t))
i i
where Hi is a given constant matrix used to describe the upper
Ṗtie−i (t) = nj=1,j=i Tij fi (t) − fj (t) . (1) bound of deception attack.
⎪
⎪ It is noted that the random transmission delay τ (t) usu-
⎪
⎪ Ṗgi (t) = T1gi ui (t) − R1gi fi (t) − Pgi (t)
⎪
⎩ Ṗ (t) = 1 P (t) − P (t)
Theorem 1: For given parameters h, ρ and controller gain + Sy(S1i + hY1i , xi (t)) − Sy(S1i , xi (t − h))
Ki , the system (14) is mean-square asymptotically stable with + Sy(S2i + hY2i , ϕi (t)) − Sy(S2i , ϕi (t − h))
required H∞ index γi , if there exist symmetric matrices Pi , 0 0
S1i > 0, Y1i > 0, S2i > 0, Y2i > 0, (i = 1, 2, . . . , n), − Sy(Y1i , xi (t + s))ds − Sy(Y2i , ϕi (t + s))ds.
0 < Zi < νI and matrix Xi such that −h −h
(24)
Pi > 0, (17)
Using Lemma 1 to handle the integral terms in (24) gives
i + i < 0, (18)
0
0
for i = 1, 2, . . . , n, where = ( −h g(s)gT (s)ds)−1 , − Sy(Y1i , xi (t + s))ds ≤ −Sy( ⊗ Y1i , Gxi (t)), (25)
−h
Pi = Pi + diag{0, ⊗ S1i , ⊗ S2i )}, 0
− Sy( ⊗ Y1i , Ix ) + Sy(S2i + hY2i − Zi , I4 ) νxiT (t)(Hi Ci )T Hi Ci xi (t) − ϕiT (t)Zi ϕi (t) ≥ 0. (27)
− Sy(S2i , I5 ) − Sy ⊗ Y2i , Iϕ − γi2 Sy I, I8+2 According to (15), (22) and (23), it results in
− Sy I, I9+2 + He IT9+2 Ci I2 ,
ξi (t) = Jζi (t), ξ̇i (t) = Qζi (t). (28)
G i = −I1 + Ai I2 + Bi Ki Ci I1 Ix + λ̄Bi Ki I2 Iϕ + Fi I8+2 ,
Combining (24), (25), (26) and (27), we obtain
1 = G ⊗ I( +1)4 , G
X i = (μ1 Xi I1 +μ2 Xi I2 )T , G 2 = G ⊗ I( +1)2 ,
⎡ ⎤ ⎡ ⎤ V̇(t) − γi2 ωiT (t)ωi (t) + zTi (t)zi (t) ≤ Sy(i + i , ζi (t)). (29)
I2 I1
J = ⎣ Ix ⎦, Q = ⎣ G(0)I2 − G(−h)I3 − G 1 Ix ⎦,
From the definition of ζi (t) in (15), the system (14) can be
Iϕ G(0)I4 − G(−h)I5 − G 2 Iϕ expressed as
T T
⎧# $
⎪
⎪ 05,5(a−1) I5 05,5(3−a) 05,4 05,5(1+ ) 05,2(1+ ) 05,4 , a = 1, 2, 3
⎪
⎪ # $
⎪
⎨ #02,15 02,5(a−4) I2 02,5(5−a) 02,5(1+ ) 02,2(1+ ) 02,4 , a = 4, 5
$
Ia = 0 05,4 05,5(a−6) I5 05,5(6+ −a) 05,2(1+ ) 05,4 , a = 6, . . . , 6 + (16)
⎪
⎪ # 5,15 $
⎪
⎪ 0 02,4 02,5(1+ ) 02,2(a−7− ) I2 02,2(7+2 −a) 02,4 , a = 7 + , · · · , 7 + 2
⎪
⎩#
2,15
$
02,15 02,4 02,5(1+ ) 02,2(1+ ) 02,2(8+2 −a) I2 02,2(9+2 −a) , a = 8 + 2 , . . . , 9 + 2
4842 IEEE TRANSACTIONS ON SMART GRID, VOL. 13, NO. 6, NOVEMBER 2022
Moreover, the controller gains are computed by Ki = Li Ni−1 . By using Schur complement to (40), one can get
Proof: Adopting Schur complement to (18) leads to
−I (Ni Ci − Ci Mi )T
< 0, (41)
i νIT2 (Hi Ci )T ∗ −I
< 0. (38)
∗ −νI which equals the condition (37) with a sufficient small constant
Define Mi = Xi−1 , P̃i = (I2( +1)+1 ⊗ Mi )Pi (I2( +1)+1 ⊗ Mi ), > 0. Then, the proof is fulfilled.
S̃1i = Mi S1i Mi , Ỹ1i = Mi Y1i Mi , S̃2i = Ni S2i Ni , Ỹ2i = Ni Y2i Ni ,
Ni Ci = Ci Mi and Li Ci = Ki Ci Mi . IV. C IRCUITAL I MPLEMENTATION
Left- and right-multiplying (38) with M i = In this section, a specific circuital execution method is used
diag{Mi , Mi , Mi , Ni , Ni , I +1 ⊗ Mi , I +1 ⊗ Ni , I, I} and to imitate the considered LFC power system, where the system
its transpose, one has components and controller are realized by some equivalent
analogy circuits based on resistors, capacitors and operational
ˆ i νIT Mi (Hi Ci )T
2 < 0, (39) amplifiers. For simplification of presentation, the first control
∗ −νI
area (i = 1) of a multi-area NPS with three control areas is
where ˆ i = ˆ i + He(X̃ i G˜ i ), discussed below.
It is noted that the dynamics of system components are
ˆ i = He JT P̃i Q + Sy S̃1i + hỸ1i , I2 − Sy S̃1i , I3 described via some first-order inertial elements in Fig. 1. By
defining the parameters as: r1 = r2 , Tgi = r1 c1 , r3 = r4 , Tti =
− Sy ⊗ Ỹ1i , Ix + Sy S̃2i + hỸ2i − NiT Zi Ni , I4 r3 c2 , Di = rr65 , Mi = r5 c3 , the equivalent analogy circuits of
− Sy S̃2i , I5 − Sy ⊗ Ỹ2i , Iϕ − γi2 Sy I, I8+2 them are shown in Fig. 3 (a), (b) and (c), respectively. The
droop constant can be viewed as a proportion element, and its
Utilizing the inequality −NiT Zi Ni ≤ ρ 2 Zi−1 − 2ρNi to (39) The circuital realization of the PI controller is drawn in
yields (36) by introducing a novel variable matrix Zi = Zi−1 . Fig. 4, where a proportion circuit, an integration circuit and
It is infeasible to solve the equation Ni Ci = Ci Mi since it an adding
circuit are used to represent ui (t) = KPi ACEi (t) +
is not a strict inequality. Then the problem of tackling the KIi ACEi (t)dt with KPi = rr109 and KIi = r111c4 .
YAN et al.: PROBABILITY-DENSITY-DEPENDENT LFC OF POWER SYSTEMS 4843
TABLE II
T HE VALUES OF C IRCUIT E LEMENTS
Fig. 5. Circuital implementation of ACEi (t) for Area 1. For the given matrix Hi = I2 , and considering the
tanh(yi1 (t))
TABLE I deception attack signal ϕi (t) = , we have
T HE VALUES OF PARAMETERS
tanh(yi2 (t))
ϕi (t)2 ≤ Hi Ci xi (t)2 based on |tanh(yi1 (t))| ≤ 1 and
|tanh(yi2 (t))| ≤ 1. Under the given H∞ index γi = 20, by
choosing = 0.01, μ1 = 0.1, μ2 = 0.5, ρ = 0.3 and
ν = 10, the controller gains of three power systems solved by
Theorem 2 for different probabilities of the attack occurrence
λ̄ = 0.5 are derived as:
# $
K1 = 0.6718, −0.2956 ,
# $
K2 = 0.7781, −0.3324 ,
# $
K3 = 0.8797, −0.5440 .
The signal ACEi (t) of (2) shown in Fig. 5 is the sum of the The control system is simulated via circuital realization
signal βi fi (t) and the signal Ptie−i (t), which can be realized method in Simulink/MATLAB. The system components and
by adding circuit with OA and some resistors with the same the PI controller can be realized by equivalent electrical cir-
resistance values. The signal βi fi (t), the product of the bias βi cuits. The professional Simcape toolbox of Simulink is used
and fi (t), can be achieved by proportion circuit
with βi = rr19 18
. to realize the governor, turbine and power generator of Area 1,
The signal P
tie−i (t) equals to the sum of T 12 (f 1 (t) − which is given in Fig. 6. Due to page limitation, the other simu-
f2 (t)) and T13 (f1 (t) − f3 (t)), which can be derived by lation diagrams are omitted here. The communication network
integration circuits with r14 c5 = 1 and r17 c6 = 1. Moreover, is executed by a variable delay module and a random num-
the signal T12 (f1 (t) − f2 (t)) is obtained by subtraction cir- ber module generating the random delay given by Simulink.
cuit and proportion circuit with T12 = rr13 12
. The same process According to Section IV, the values of resistors and capacitors
of deriving the signal T13 (f1 (t) − f3 (t)) is executed with of analogy circuits for the Area 1 are given in Table II. Due
T13 = rr16
15
. to page limitation, the other two areas are omitted here.
Remark 5: The equivalent analogy circuits for power In the simulation, the sampling period is 0.01s and the initial
systems can be viewed as low-cost simulators, which are used condition is zero. The following two different cases of load
to test the effectiveness of the proposed control method. This variations are considered.
is helpful for avoiding the serious hazard induced by poten- Case 1: The load variations for three control areas are
tial drawbacks of designed controller to expensive devices of Pd1 (t) = 0.1sin(0.5t), Pd2 (t) = 0.1sin(π t) and Pd3 (t) =
practical systems. Meanwhile, the cost of testing can be saved 0.1sin(1.5t) for 0 < t < 5s; otherwise, Pdi (t) = 0 for t ≥ 5s
dramatically. and i = 1, 2, 3.
Case 2: The load variations for three control areas are
V. E XAMPLE Pdi (t) = 0.1 for 0 < t < 2s; Pdi (t) = −0.1 for 2 ≤ t < 4s;
The parameters of the considered NPS are borrowed otherwise, Pdi (t) = 0 for t ≥ 4s and i = 1, 2, 3.
from [34], which are presented in Table I. For the considered deception attacks and the load variations
In this example, the random transmission delays shown in in Case 1, the frequency trajectories by using the designed
Fig. controller gains are drawn in Fig. 7. Meanwhile, the corre-
0 2 are considered. In order to correspond to the form of sponding curves for Case 2 are drawn in Fig. 8. These figures
−h g(s)x(t + s)ds in the derivations, g(τ ) is written as g(s) =
denote that for the above two different situations of load vari-
g0 (s) = −2500se50s , s ∈ [−h, 0]. For = 1, to construct
ations, the designed controllers are effective for maintaining
the vector g(s) satisfying (7), another term g1 (s) = −50e50s
the system frequencies to be stable even when control signals
is chosen. Then, the vector g(s) and corresponding parameters
are attacked by deceptive data.
are given as
To show the advantages of the proposed method over some
−2500se50s 50 50 0.16 0.08 existing ones, three groups of comparison results are provided
g(s) = , G = , = .
−50e50s 0 50 0.08 0.08 as below.
4844 IEEE TRANSACTIONS ON SMART GRID, VOL. 13, NO. 6, NOVEMBER 2022
Fig. 6. The diagram for governor, turbine and power generator of Area 1 via circuital realization in Simulink/MATLAB.
TABLE IV
C OMPARISON OF ℘ AND THE M INIMUM H∞ I NDEX γ
U NDER D IFFERENT M ETHODS
Fig. 9. Case 3: Responses of the frequency for three areas with ‘standard
controller.’
this figure and Table IV, it is indicated that ℘ increases and [11] S. Yan, S. K. Nguang, and Z. Gu, “H∞ weighted integral event-triggered
the approximation error e(τ ) decreases as the growth of . synchronization of neural networks with mixed delays,” IEEE Trans. Ind.
Informat., vol. 17, no. 4, pp. 2365–2375, Apr. 2021.
Meanwhile, one can also observe that our approach needs [12] M. H. Khooban, T. Niknam, F. Blaabjerg, and T. Dragicevic, “A new load
fewer decision variables to deal with the random delay and frequency control strategy for micro-grids with considering electrical
deception attack without any approximation error and leads to vehicles,” Elect. Power Syst. Res., vol. 143, pp. 585–598, Feb. 2017.
[13] H. Bevrani and T. Hiyama, “On load-frequency regulation with time
better H∞ performance than the existing approach in [29]. delays: Design and real-time implementation,” IEEE Trans. Energy
Based on these comparison results, it is shown that the Convers., vol. 24, no. 1, pp. 292–300, Mar. 2009.
proposed LFC method for NPSs subject to random delay and [14] Y. Mi et al., “Sliding mode load frequency control for multi-area time-
deception attacks in this manuscript is more effective than delay power system with wind power integration,” IET Generat. Transm.
Distrib., vol. 11, no. 18, pp. 4644–4653, 2017.
some existing methods. [15] C.-K. Zhang, L. Jiang, Q. H. Wu, Y. He, and M. Wu, “Delay-dependent
robust load frequency control for time delay power systems,” IEEE
Trans. Power Syst., vol. 28, no. 3, pp. 2192–2201, Aug. 2013.
VI. C ONCLUSION [16] J. Li, Z. Chen, D. Cai, W. Zhen, and Q. Huang, “Delay-dependent sta-
This work studied the decentralized H∞ secure LFC of bility control for power system with multiple time-delays,” IEEE Trans.
Power Syst., vol. 31, no. 3, pp. 2316–2326, May 2016.
NPSs with random communication delays and deception
[17] Y. Tipsuwan and M.-Y. Chow, “Gain scheduler middleware: A
attacks. A novel model of random transmission delays has methodology to enable existing controllers for networked control and
been presented by using the delay probability density. Based teleoperation-part I: Networked control,” IEEE Trans. Ind. Electron.,
on this model, the normal control signals and deception attacks vol. 51, no. 6, pp. 1218–1227, Dec. 2004.
[18] S. Yan, Z. Gu, and S. K. Nguang, “Memory-event-triggered H∞
were represented as two distributed delay terms, in which output control of neural networks with mixed delays,” IEEE
the probability density is treated as the distributed delay Trans. Neural Netw. Learn. Syst., early access, Jun. 4, 2021,
kernel. Then, new sufficient probability-density-dependent doi: 10.1109/TNNLS.2021.3083898.
[19] C. Peng, Q.-L. Han, and D. Yue, “Communication-delay-distribution-
conditions were proposed by Lyapunov method to design the dependent decentralized control for large-scale systems with IP-based
decentralized H∞ secure controller to maintain the system communication networks,” IEEE Trans. Control Syst. Technol., vol. 21,
frequencies. The dynamics of power system were realized by no. 3, pp. 820–830, May 2013.
[20] H. Sun, C. Peng, D. Yue, Y. Wang, and T. Zhang, “Resilient
electrical circuit systems, which were executed by the profes- load frequency control of cyber-physical power systems under QoS-
sional Simcape toolbox of Simulink/MATLAB. The simulation dependent event-triggered communication,” IEEE Trans. Syst., Man,
examples demonstrated the effectiveness of the developed Cybern., Syst., vol. 51, no. 4, pp. 2113–2122, Apr. 2021.
approach. In addition, how to extend the developed approach [21] Y. Tang, D. Zhang, P. Shi, W. Zhang, and F. Qian, “Event-based for-
mation control of multi-agent systems under DoS attacks,” IEEE Trans.
to handle the LFC issue of NPSs with nonlinear dynamics or Autom. Control, vol. 66, no. 1, pp. 452–459, Jan. 2021.
integrated with wind power and solar power deserves further [22] H.-T. Sun, C. Peng, and F. Ding, “Self-discipline predictive control of
investigations in the future. autonomous vehicles against denial of service attacks,” Asian J. Control,
Feb. 2022, doi: 10.1002/asjc.2749.
[23] F. Qu, E. Tian, and X. Zhao, “Chance-constrained H∞ state estima-
R EFERENCES tion for recursive neural networks under deception attacks and energy
constraints: The finite-horizon case,” IEEE Trans. Neural Netw. Learn.
[1] C. Zhao, W. Sun, J. Wang, Q. Li, D. Mu, and X. Xu, “Distributed cooper- Syst., early access, Jan. 7, 2022, doi: 10.1109/TNNLS.2021.3137426.
ative secondary control for islanded microgrid with Markov time-varying [24] T.-Y. Zhang and D. Ye, “False data injection attacks with complete
delays,” IEEE Trans. Energy Convers., vol. 34, no. 4, pp. 2235–2247, stealthiness in cyber-physical systems: A self-generated approach,”
Dec. 2019. Automatica, vol. 120, Oct. 2020, Art. no. 109117.
[2] K. Xiahou, Y. Liu, and Q. Wu, “Robust load frequency control of power [25] S. Yan, Z. Gu, and J. H. Park, “Memory-event-triggered H∞ load
systems against random time-delay attacks,” IEEE Trans. Smart Grid, frequency control of multi-area power systems with cyber-attacks and
vol. 12, no. 1, pp. 909–911, Jan. 2021. communication delays,” IEEE Trans. Netw. Sci. Eng., vol. 8, no. 2,
[3] Y. Wu, Z. Wei, J. Weng, X. Li, and R. H. Deng, “Resonance attacks on pp. 1571–1583, Apr.-Jun. 2021.
load frequency control of smart grids,” IEEE Trans. Smart Grid, vol. 9,
[26] J. Liu, Y. Gu, L. Zha, Y. Liu, and J. Cao, “Event-triggered H∞
no. 5, pp. 4490–4502, Sep. 2018.
load frequency control for multiarea power systems under hybrid
[4] F. Yang, J. He, and Q. Pan, “Further improvement on delay-dependent
cyber attacks,” IEEE Trans. Syst., Man, Cybern., Syst., vol. 49, no. 8,
load frequency control of power systems via truncated B–L inequality,”
pp. 1665–1678, Aug. 2019.
IEEE Trans. Power Syst., vol. 33, no. 5, pp. 5062–5071, Sep. 2018.
[5] J. He, Y. Liang, X. Hao, F. Yang, and Q. Pan, “A quadratic [27] X.-Z. Jin, W.-W. Che, Z.-G. Wu, and H. Wang, “Analog control
convex framework with bigger freedom for the stability analysis circuit designs for a class of continuous-time adaptive fault-tolerant
of a cyber-physical microgrid system,” Sci. China Inf. Sci., 2022, control systems,” IEEE Trans. Cybern., early access, Oct. 23, 2020,
doi: 10.1007/s11432-021-3433-8. doi: 10.1109/TCYB.2020.3024913.
[6] C. Peng, J. Zhang, and H. Yan, “Adaptive event-triggering H∞ load [28] X. Jin, S. Wang, J. Qin, W. X. Zheng, and Y. Kang, “Adaptive fault-
frequency control for network-based power systems,” IEEE Trans. Ind. tolerant consensus for a class of uncertain nonlinear second-order multi-
Electron., vol. 65, no. 2, pp. 1685–1694, Feb. 2018. agent systems with circuit implementation,” IEEE Trans. Circuits Syst.
[7] Y. Liu, Y. Chen, and M. Li, “Dynamic event-based model predictive I, Reg. Papers, vol. 65, no. 7, pp. 2243–2255, Jul. 2018.
load frequency control for power systems under cyber attacks,” IEEE [29] A. Seuret, F. Gouaisbaut, and Y. Ariba, “Complete quadratic
Trans. Smart Grid, vol. 12, no. 1, pp. 715–725, Jan. 2021. Lyapunov functionals for distributed delay systems,” Automatica,
[8] E. Tian and C. Peng, “Memory-based event-triggering H∞ load vol. 62, pp. 168–176, Dec. 2015.
frequency control for power systems under deception attacks,” IEEE [30] P. Kundur, Power System Stability and Control. 2nd ed. New York, NY,
Trans. Cybern., vol. 50, no. 11, pp. 4610–4618, Nov. 2020. USA: Springer, 2014.
[9] T. Yang, Y. Zhang, W. Li, and A. Y. Zomaya, “Decentralized net- [31] S. Saxena and Y. V. Hote, “Load frequency control in power systems via
worked load frequency control in interconnected power systems based internal model control scheme and model-order reduction,” IEEE Trans.
on stochastic jump system theory,” IEEE Trans. Smart Grid, vol. 11, Power Syst., vol. 28, no. 3, pp. 2749–2757, Aug. 2013.
no. 5, pp. 4427–4439, Sep. 2020. [32] Y. C. Tian, D. Levy, M. O. Tade, T. Gu, and C. Fidge, “Queuing packets
[10] Y. Mi, Y. Fu, C. Wang, and P. Wang, “Decentralized sliding mode load in communication networks for networked control systems,” in Proc.
frequency control for multi-area power systems,” IEEE Trans. Power 6th World Congr. Intell. Control Automat., Dalian, China, vol. 1, 2006,
Syst., vol. 28, no. 4, pp. 4301–4309, Nov. 2013. pp. 205–209.
YAN et al.: PROBABILITY-DENSITY-DEPENDENT LFC OF POWER SYSTEMS 4847
[33] Q. Feng and S. K. Nguang, “Stabilization of uncertain linear distributed Ju H. Park (Senior Member, IEEE) received the
delay systems with dissipativity constraints,” Syst. Control Lett., vol. 96, Ph.D. degree in electronics and electrical engineer-
pp. 60–71, Oct. 2016. ing from the Pohang University of Science and
[34] D. Rerkpreedapong, A. Hasanovic, and A. Feliachi, “Robust load Technology (POSTECH), Pohang, South Korea, in
frequency control using genetic algorithms and linear matrix inequal- 1997.
ities,” IEEE Trans. Power Syst., vol. 18, no. 2, pp. 855–861, May 2003. From May 1997 to February 2000, he was
[35] C. A. R. Crusius and A. Trofino, “Sufficient LMI conditions for output a Research Associate with Engineering Research
feedback control problems,” IEEE Trans. Autom. Control, vol. 44, no. 5, Center-Automation Research Center, POSTECH.
pp. 1053–1057, May 1999. He joined Yeungnam University, Gyeongsan, South
Korea, in March 2000, where he is currently the
Chuma Chair Professor. He has coauthored the
monographs Recent Advances in Control and Filtering of Dynamic Systems
with Constrained Signals (New York, NY, USA: Springer-Nature, 2018)
and Dynamic Systems With Time Delays: Stability and Control (New York,
NY, USA: Springer-Nature, 2019) and is an Editor of an edited volume
Recent Advances in Control Problems of Dynamical Systems and Networks
(New York: Springer-Nature, 2020). His research interests include robust
control and filtering, neural/complex networks, fuzzy systems, multiagent
systems, and chaotic systems. He has published a number of articles in these
areas. Since 2015, he has been a recipient of the Highly Cited Researchers
Award by Clarivate Analytics (formerly, Thomson Reuters) and listed in
three fields, Engineering, Computer Sciences, and Mathematics, in 2019,
2020, and 2021. He also serves as an Editor for the International Journal
of Control, Automation and Systems. He is also a Subject Editor/Advisory
Editor/Associate Editor/Editorial Board Member of several international jour-
nals, including IET Control Theory & Applications, Applied Mathematics
Shen Yan received the B.E. and Ph.D. degrees and Computation, Journal of The Franklin Institute, Nonlinear Dynamics,
from the College of Electrical Engineering and Engineering Reports, Cogent Engineering, the IEEE T RANSACTION ON
Control Science of Nanjing Technology University, F UZZY S YSTEMS, the IEEE T RANSACTION ON N EURAL N ETWORKS AND
Nanjing, China. From 2017 to 2018, he was a visit- L EARNING S YSTEMS, and the IEEE T RANSACTION ON C YBERNETICS. He
ing Ph.D. student with the University of Auckland, is a Fellow of the Korean Academy of Science and Technology (KAST).
Auckland, New Zealand. From February 2022 to
August 2022, he was a Visiting Scholar with
Yeungnam University, Gyeongsan, South Korea. He
is currently an Associate Professor with the College
of Mechanical and Electronic Engineering, Nanjing Xiangpeng Xie (Member, IEEE) received the B.S.
Forestry University, Nanjing, China. His current and Ph.D. degrees in engineering from Northeastern
research interests include networked control systems, event-triggered control, University, Shenyang, China, in 2004 and 2010,
and their applications. respectively.
From 2010 to 2014, he was a Senior Engineer with
Metallurgical Corporation of China Ltd., Beijing,
China. He is currently a Professor with the Institute
of Advanced Technology, Nanjing University of
Posts and Telecommunications, Nanjing, China. His
research interests include fuzzy modeling and con-
trol synthesis, state estimations, optimization in pro-
cess industries, and intelligent optimization algorithms. He serves as an
Associate Editor for the International Journal of Control, Automation, and
Systems and the International Journal of Fuzzy Systems.