Licheng Wang - Data-Rate-Constrained State Estimation and Control of Complex Networked Systems (2025)
Licheng Wang - Data-Rate-Constrained State Estimation and Control of Complex Networked Systems (2025)
List of Figures...............................................................................................................................x
List of Tables.............................................................................................................................xiii
Preface..........................................................................................................................................xiv
Foreword....................................................................................................................................xvi
Acknowledgment..................................................................................................................xvii
Contributors...........................................................................................................................xviii
Symbols.......................................................................................................................................xix
1. Introduction...........................................................................................................................1
1.1 Theoretical Outlines................................................................................................2
1.2 Main Encoding-Decoding Schemes in NSs ................................................5
1.3 Encoding-Decoding-Based Control and Filtering Problems........... 13
1.4 Distributed Control and State Estimation Problems
with Limited Communication Capacity.................................................... 21
1.5 Outline........................................................................................................................ 25
vii
viii Contents
Bibliography...........................................................................................................................213
Index............................................................................................................................................226
List of Figures
x
List of Figures xi
xiii
Preface
xiv
Preface xv
materials for researchers who wish to explore the control and state estimation
problems with constrained data rates.
The concise frame and description of the book are given as follows.
Chapter 1 introduces the recent advances on data-rate-constrained control
and state estimation problems for networked systems and the outline
of the book. Chapter 2 investigates the state estimation for discrete-time
complex networks subject to date-rate constraints. Chapter 3 is concerned
with the finite-time state estimation problem for artificial neural networks
under constrained bit rate, where only partial neurons measurement
outputs are available for the state estimation task. Chapter 4 considers the
synchronization control for a class of discrete-time dynamical networks
with a uniform-based encoding-decoding method. Chapter 5 studies the
observer-based consensus control for discrete-time multi-agent systems
with coding-decoding communication protocol. Chapter 6 deals with the
recursive filtering problem for time-varying systems where a static multiple
description coding scheme is introduced to facilitate the data transmission.
Chapter 7 addresses the stabilization issue of linear discrete-time systems
over resource-constrained networks under dynamical multiple description
coding scheme. In Chapter 8, an event-triggered encoding approach is
employed to the control issue of linear systems under bit rate conditions.
Chapter 9 discusses a sign-based coding approach to the state estimation
problem under constrained bit rate. Chapter 10 gives the conclusion and
some possible future research directions. Simulations given in this book are
constructed by applying The MathWorks MATLAB software package.
This book is a research monograph whose intended audience is graduate
and postgraduate students as well as researchers.
Licheng Wang
Shanghai, China
Foreword
xvi
Acknowledgment
The authors would like to express their deep appreciation to those who
have been directly involved in various aspects of the research leading to
this book. Special thanks go to Professor Bo Shen from Donghua University,
Shanghai, China, Professor Fuad E. Alsaadi from King Abdulaziz University,
Jeddah, Saudi Arabia, Professor Xiaohui Liu from Brunel University London,
London, UK, Professor Derui Ding from University of Shanghai for Science
and Technology, Shanghai, China, Professor Tingwen Huang from Texas
A&M University at Qatar, Doha, Qatar, Professor Hongli Dong from
Northeast Petroleum University, Daqing, China, and Professor Yurong Liu
from Yangzhou University, Yangzhou, China.
The writing of this book was supported in part by the National
Natural Science Foundation of China under Grants 62473247, 62473261,
62003213, 61903253, 61873148, 61933007, 61873169, 61873059 and 61973219,
the China Postdoctoral Science Foundation under Grants 2019TQ0202 and
2020M671172, the National Postdoctoral Program for Innovative Talents
under Grant BX20180202, the Shanghai Pujiang Program under Grant
19PJ1408100, the Royal Society of the UK and the Alexander von Humboldt
Foundation of Germany.
xvii
Contributors
xviii
Symbols
xix
xx Symbols
DOI: 10.1201/9781003534853-1 1
2 Data-Rate-Constrained State Estimation and Control
FIGURE 1.1
Structure of the general communication system.
nonlinear NSs have appeared. Among them, it has been shown in [155] and
[115] that for linear systems, the minimum bit rate R (bits/sample) should
satisfy R > log1(2) Re(λi (A))>0 (λi (A)), where log is the base-e logarithm,
P
FIGURE 1.2
Framework of data-rate-constrained control and state estimation issues.
for the NSs. Various usually adopted design schemes of the encoding-
decoding procedure in the NSs and their individual characteristics are
reviewed. Subsequently, recent advances on the encoding-decoding-based
control and filtering problems for the NSs are, respectively, surveyed. Then,
the control and filtering issues for distributed systems with encoding-
decoding communication scheme are discussed. Finally, conclusions and
future research directions are presented. The main contents that are reviewed
in this paper and the framework are shown in Figure 1.2.
or
ẋ(t) = Ax(t) + Bu(t) + Dw(t) (1.2)
6 Data-Rate-Constrained State Estimation and Control
FIGURE 1.3
The summarization of several typical encoding-decoding schemes in NCSs.
where x(t) ∈ Rnx , u(t) ∈ Rnu , and y(t) ∈ Rny are, respectively, the system state,
the system input, and the measurement output. w(t) ∈ Rnw and v(t) ∈ Rnv
are the process and the measurement noises. A, B, C, D, and E are the
known matrices with compatible dimensions. For analysis convenience, in
this paper, it is assumed that the system state x(t) is accessible for the
stabilization problem, while for the filtering issue, it is supposed that only
the measurement output y(t) is observable. Till now, in the existing literature,
two representative design solutions of the encoding-decoding procedure
have been proposed to deal with the control and filtering problems in
the NSs, namely, the quantization-based encoding-decoding technique and
the symbolic-based encoding-decoding technique. Several typical encoding-
decoding schemes in the NCSs are exhibited in Figure 1.3. In the following,
we are in a position to successively illustrate these encoding-decoding design
approaches mentioned above.
state x(jT) and the decoded state x̂(jT) which will be defined later,
where e(jT) = x(jT) − x̂(jT− ), we are able to determine the uniform
quantization parameter “a” and thus partition the hyperrectangle Ba
into qn equal sub-hyperrectangles. Here, x̂(jT− ) denotes the limit of
x̂(jT) at the point of jT from the left, that is, x̂(jT− ) , limǫ>0,ǫ→0 x̂(jT −
ǫ). Subsequently, generate the corresponding codeword sequence
{s1 , s2 , . . . , sn } according to the region where the error “e(jT)” belongs
to and then transmit the codeword sequence {s1 , s2 , . . . , sn } to the
decoder to obtain the decoded state x̂(jT). Finally, design the
controller “u(jT)” in terms of the decoded state x̂(jT) to stabilize the
original system.
Based on the above analysis, the detailed form of the encoder and
decoder is given as follows:
Coder: For e(jT) ∈ Is11 (a(jT)) × Is22 (a(jT)) × · · · × Isnn (a(jT)) ⊂ Ba(jT) , we
have
g(e(jT)) = {s1 , s2 , . . . , sn } (1.6)
where a((j + 1)T) = ϕ(T, q, x(0))a(jT) for j = 1, 2, . . . with ϕ(T, q, x(0))
being the function of certain form with respect to the encoding
period T, the quantization level q and the initial condition x(0).
Decoder:
x̂(0) = 0
ẋˆ(t) = Ax̂(t) + Bu(t), ∀t ∈ [jT, (j + 1)T)
(1.7)
x̂(jT) = x̂(jT− ) + ηa (s1 , s2 , . . . , sn )
u(t) = Kx̂(t).
From structures of the coder (1.6) and the decoder (1.7), we have the
following observations. 1) The proposed encoding approach is a kind
of differential encoding technique. It is obvious that, in (1.6), only
the decode error e(jT) is encoded at the encoding time jT. In fact, by
using the differential quantization encoding technique to encode the
signal difference, the amount of the information to be sent is greatly
reduced, see [27]. 2) It can be seen from the iteration relationship
between a((j+1)T) and a(jT) that the quantization region dynamically
varies at each encoding instant, and such a quantizer is referred to
as the dynamic quantizer. 3) In order to enforce the decoding error
be convergent, it is required that ϕ(T, q, x(0)) < 1, from which, we
can see that the convergence of the encoding-decoding algorithm is
closely associated with the encoding period, the quantization level
and the initial condition of the system.
Apart from the continuous-time case, for the discrete-time
counterpart, the encoding-decoding communication strategy for
Introduction 9
where x̂(t) is the output of the decoder, namely, the decoded value.
It can be concluded from the structure of the above encoder-
decoder that 1) although the saturation value L is fixed a priori,
due to the introduction of the scaling function g(t), the signal to be
quantized is enforced to be pre-processed first by the “zooming out”
or “zooming in” technique, and hence this type of encoding approach
is still of the dynamic-quantization-based encoding, 2) as discussed
above, encoding the difference between x(t) and ξ(t − 1) with scaling
rather than the system state x(t) itself possibly reduces the bits which
10 Data-Rate-Constrained State Estimation and Control
Decoder:
g1l (θl (t)),
when λ1 (t) = 1, λ2 (t) = 0
ȳl (t) = g2l (ϑl (t)), when λ1 (t) = 0, λ2 (t) = 1 (1.12)
when λ1 (t) = 1, λ2 (t) = 1
gcl (θl (t), ϑl (t)),
FIGURE 1.4
Multiple description encoding-based data communication in NSs.
12 Data-Rate-Constrained State Estimation and Control
where f1l ( · ) and f2l ( · ) are two coding functions whose outputs
θl (t) and ϑl (t) can be regarded as the individual descriptions of
the source yl (t) with yl (t) being the lth component of y(t). g1l ( · )
and g2l ( · ) are two side decoding functions and gcl (·, ·) is the
central decoding function. λi (t) (i = 1, 2) are two independent
random variables characterizing the packet dropout phenomena
during the transmissions of the individual description, which
satisfy the Bernoulli binary distribution taking values on either
1 or 0 with mathematical expectations λ̄i and variances σi2 ,
respectively.
The early research effort on the MDC was mainly devoted to
its theoretical research. Since the scalar quantization-based MDC
method was first proposed in [156], the research direction has
been moved from the pure theoretical investigation to its practical
applications. From then on, the MDC has experienced a huge
development in the theory and applications, and myriad coding
schemes have appeared. It should be pointed out that most results
of the MDC have been centered on the applications in distributed
storage systems [60], diversity communication systems (antenna
diversity) [133], and image/audio/video encoding [3,5,13,176].
However, to the best of the authors’ knowledge, the relevant results
of the MDC with respect to the control and filtering problems of NSs
are very few.
• Symbolic-Based Encoding-Decoding Mechanism
This kind of encoding schemes, also called as the “binary encoding”,
mainly takes the sign of the source into account, and thus only one
bit is utilized to encode the signal. For convenience, in the sequel, we
call it as the binary encoding instead of the symbolic-based encoding.
Usually, the binary encoding technique including two versions, that
is, the absolute (static) encoding technique [32,33] and the differential
(dynamic) encoding technique [63, 89]. Since the dynamic binary
encoding technique is more complicated than the static one, in the
following, we will concentrate our attention on the dynamic binary
encoding-decoding technique.
As we know, such a kind of dynamic encoding scheme was first
proposed in [63], which is highly dependent on the change of certain
system parameters. The core of the encoding rule can be expressed as
follows with the system model (1.1) and (1.3).
FIGURE 1.5
NCSs with the encoding-decoding-based communication protocol.
In [16], the pioneering work has been reported on the NCSs with
quantization-based state feedback control strategy, which plays an
important role in the subsequent fruitful results on the encoding-
decoding schemes. In [171], the stabilization issue for a class of linear
time-invariant system subject to the bandwidth constraint has been
considered, where the encoding-decoding-based communication
protocol has been introduced. For the quantization-based encoding
scheme, a sufficient condition for the existence of the bit rate which
enables to stabilize the system has been derived. Moreover, when
the system reduces to a scalar one, a tight sufficient and necessary
condition has been obtained. Nevertheless, the concrete forms of
both the encoder and decoder are not explicitly given in their paper.
The quadratic stabilization problem for sampled-data systems has
been discussed in [53] under a bandwidth-constrained situation,
where the memoryless uniform and logarithmic quantizers have
been designed to overcome the circumstances of the limited bit
rate of the communication channel and an upper bound on the
bit rate has been acquired to achieve the stabilization purpose.
Furthermore, both the state encoding and output encoding schemes
have been developed in [85] for the continuous-time linear systems,
and the encoding procedure has been well described in terms
of the uniform quantization method. Meanwhile, the quantitative
relationship between the number of the values taken from the
encoder and the open-loop system parameters has been derived,
under which the globally asymptotic stability of the closed-loop
system has been guaranteed.
Nonlinear Systems
Subsequently, a number of research results have been extended to
the encoding-decoding issues for the nonlinear NCSs, see [55,80,
85,87,119,123–125, 140, 190]. In [87], by utilizing the decoded system
state, a feedback control strategy has been proposed to stabilize
a class of continuous-time Lipschitz-type nonlinear systems. The
ISS theory has been employed to characterize the impact of the
Introduction 15
FIGURE 1.6
Filtering system model with encoding-decoding-based data transmission scheme.
FIGURE 1.7
The architecture of distributed systems with encoding-decoding communication mechanism.
1.5 Outline
Throughout this paper, we have summarized the existing results on the
encoding-decoding-based control and state estimation/filtering issues for
NSs. Several typical encoding-decoding schemes and the corresponding
encoder-decoder structures have been systematically reviewed. Subse-
quently, for different kinds of NSs, a variety of encoding-decoding-based
control and state estimation problems have been thoroughly surveyed.
Finally, based on the literature review, possible relative directions for the
further research work are listed as follows.
The framework of this book is shown as follows:
DOI: 10.1201/9781003534853-2 29
30 Data-Rate-Constrained State Estimation and Control
M
X
ui (t + 1) = Ai ui (t) + γ (t)fi (ui (t)) + σij 3uj (t) + Di wi (t) (2.1)
j=1
where ui (t) ∈ Rnu is the state vector of the i-th node. The process noise
wi (t) ∈ R is a zero-man Gaussian noise sequence with variance w̄i . σij > 0
is the element located in the i-th row and the j-th column of the coupling
Gain-Scheduled State Estimation 31
where ⌊·⌋ is the floor function. Thus, the center of the hyperrectangle Smi is
determined by
T
ηlii (αi1 , αi2 , . . . , αins ) , bi1 bi2 · · · bins (2.8)
(2αij −1)li
where bij = −li + q¯ i , j = 1, 2, . . . , ns . Thus, for any measurement output
(α ) (α )
si (t), there exists a unique sub-hyperrectangle Iij i1 (li ) × Iij i2 (li ) × · · · ×
(α )
Iij ins (li ) such that si (t) is contained in. Moreover, the distance between any
(α ) (α ) (α )
si (t) in the sub-hyperrectangle Ii1 i1 (li ) × Ii2 i2 (li ) ×· · ·× Iinsins (li ) and its center
ηli (αi1 , αi2 , . . . , αins ) is bounded by
i
Gain-Scheduled State Estimation 33
√
n s li
si (t) − ηlii (αi1 , αi2 , . . . , αins ) ≤ np . (2.9)
s R
2 i
R T
Ci i = αi1 αi2 . . . αins ∀i ∈ {1, 2, . . . , M} (2.10)
Define the decoding error for the measurement output of node i as s˜i (t) ,
si (t) − ŝi (t) and the augmented form as s̃(t) , [s̃T1 (t) s˜T2 (t) · · · s̃TM (t)]T . It
follows from (2.9)–(2.11) that the decoding error satisfies
√
n s li
ks̃i (t)k ≤ p
ns
(2.12)
⌊ 2R i ⌋
and
v
u ns
uX ns l2i
ks̃(t)k ≤ u
t p 2 , ̺. (2.13)
ns
i=1 ⌊ 2R i ⌋
M
X
ûi (t + 1) = Ai ûi (t) + p(t)fi (ûi (t)) + σij 3ûj (t)
j=1
where p(t) is the time-varying probability given in (2.2), Ki (t) = Ki1 + p(t)Ki2
with Ki1 and Ki2 being the estimator gain matrices to be determined. Denoting
ei (t) , ui (t) − ûi (t) as the estimation error, it is inferred from (2.1)–(2.14) that
the dynamics of the estimation error is described as
ei (t + 1) = (Ai − Ki (t)Ci )ei (t) + γ̃ (t)fi (ui (t)) + p(t)f̃i (ui (t))
M
X
+ σij Ŵej (t) − Ki (t)Ei vi (t) + Ki (t)s̃i (t) (2.15)
i=1
where γ̃ (t) , γ (t) − p(t) and f̃i (ui (t)) , fi (ui (t)) − f̂i (ui (t)). Then, for
node i, compacting the state vector ui (t) and the estimation error ei (t) as
ηi (t) , [eiT (t) uTi (t)]T , we have the following error dynamics:
where
Ai − Ki (t)Ci 0 T
Ai (t) , , ζi (t) , wTi (t) viT (t) ,
0 Ai
˜ 0 −Ki (t)Ei ˜ T
K1i (t) , , K2i (t) , KiT (t) 0
Di 0
0 I h iT
W, , Fi (ηi (t)) , f̃iT (ei (t)) fiT (ui (t)) .
0 I
¯ (η(t))
η(t + 1) = A(t)η(t) + p(t)F(η(t)) + γ̃ (t)WF
+ K̃1 (t)ζ (t) + K̃2 (t)s̃(t) (2.17)
where
K̃2 (t) , diagM {K̃2i (t)}, s̃(t) , [s̃T1 (t) s˜T2 (t) · · · s̃TM (t)]T ,
W̄ , W ⊗ IM , ζ (t) , [ζ1T (t) ζ2T (t) . . . ζM (t)]T
F(η(t)) , [FT1 (η1 (t)) FT2 (η2 (t)) . . . FTM (ηM (t))]T .
Theorem 2.1: For a known positive scalar 0 < ν < 1 and the time-varying
probability p(t) belonging to [p1 , p2 ] as well as known gain matrices Ki1 and Ki2 , the
augmented estimation error dynamics (2.17) is exponentially ultimately bounded in
mean square sense if there exist two positive definite matrices Q(p(t)), Q(p(t + 1))
and two positive scalars ǫ1 and ǫ2 such that the following matrix inequality
holds where
11
40 412
0 0
40 , ∗ 422
0 0 ,
∗ ∗ −ǫ1 IM×ns
41 , [A(t) p(t)IM×nu K̃2 (t)], I , diagM {I2nu },
42 , [0 W̄ 0], θ (p(t)) , p(t)(1 − p(t)),
4011 , −(1 − ν)Q(p(t)) − ǫ2 φ2 , 412 T
0 , −ǫ2 φ1 ,
422
0 , −ǫ2 I, φ̂1 , diag{φ̃1 , φ̃1 }, φ̂2 , diag{φ̃2 , φ̃2 },
36 Data-Rate-Constrained State Estimation and Control
and T
fi (ei (t)) Inu φ̃1 fi (ei (t))
≤ 0, (2.25)
ei (t) ∗ φ˜ 2 ei (t)
Gain-Scheduled State Estimation 37
and T
F(η(t)) I φ1 F(η(t)) (2.27)
≤ 0.
η(t) ∗ φ2 η(t)
Considering the decoding error (2.13), it follows from (2.22)–(2.27) that
E{1V(t) + νV(t)}
= E{ηT (t + 1)Q(p(t + 1))η(t + 1) − (1 − ν)ηT (t)Qη(t)}
h iT
≤ E A(t)η(t) + p(t)F(η(t)) + K̃2 (t)s̃(t) Q(p(t + 1))
where ξ(t) , [ηT (t) FT (η(t)) s̃T (t)]T and ϕ̄(t) , ǫ1 ρ 2 + ϕ(t).
According to the condition (2.19) in Theorem 2.1, one further calculates that
Up to now, the analysis issue of the addressed state estimation problem has
been investigated for DTCNs with bit-rate-constrained encoding-decoding
scheme. A sufficient condition has been provided in Theorem 2.1 to show
the ultimate boundedness of the estimation error dynamics (2.17). In what
follows, we shall focus our attention on the estimator design for the
parameters Ki1 and Ki2 .
Theorem 2.2: For a known positive scalar 0 < ν < 1 and the time-varying
probability p(t) belonging to [p1 , p2 ], if there exist positive definite matrices Q(p(t)),
Q(p(t + 1)), two positive scalars ǫ1 and ǫ2 , real-valued matrices Ki1 and Ki2 and a
nonsingular matrix S such that the following matrix inequality
40 41T θ (p(t))(S42 )T
4(p(t)) , ∗ 43 0 <0 (2.31)
∗ ∗ θ (p(t))4T4
where 4̄4 , S−T Q(p(t + 1))S−1 − S−T − S−1 . Then, with the help of the
Schur Complement Lemma, the inequality (2.19) holds if and only if the following
inequality is true
40 4T1 θ (p(t))4T2
∗ −Q(p(t + 1))−1 0 < 0. (2.33)
∗ ∗ −θ (p(t))Q−1 (p(t + 1))
In addition, based on the fact (S−1 − Q−1 (p(t + 1)))T Q(p(t + 1))(S−1 − Q−1 (p(t +
1))) ≥ 0, one obtains the relationship that −Q(p(t + 1))−1 ≤ S−T Q(p(t + 1))S−1 −
S−T − S−1 . Then, it is not difficult to verify that (2.33) holds as long as (2.31) is
true. As such, we can give the conclusion that the exponentially mean square ultimate
boundedness of the augmented system (2.17) is attained for all p(t) ∈ [p1 , p2 ]. Now,
the proof of this theorem is ended.
infinity when the time horizon reaches to infinite. Unfortunately, this is not
acceptable in engineering practice because the computation burden caused
by the implementation of the state estimation algorithm. In the next theorem,
we will make our effort to overcome such a technical difficulty and propose
an alternative method to transform the infinite number of LMIs to be solved
into finite ones. To facilitate the technical development, we assume that the
time-varying positive definite matrix is with the form Q(p(t)) = Qa + p(t)Qb ,
where Qa and Qb are two positive definite matrices.
Theorem 2.3: For a known positive scalar 0 < ν < 1 and the time-varying
probability p(t) belonging to [p1 , p2 ], if there exist two positive definite matrices
Qa and Qb , two positive scalars ǫ1 and ǫ2 , real-valued matrices Ki1 and Ki2 and a
nonsingular matrix S such that the following LMIs
θ¯ (pjk )(S82 )T
80j 8T1j
ϒ jkl , ∗ 83l 0 < 0, j, k, l = 1, 2 (2.34)
∗ ∗ θ̄ (pjk )84l
are satisfied, where 80j has the same form with 40 where only 411
0 is replaced by
−(1 − ν)(Qa + pj Qb ) − ǫ2 φ2 and
p2 − p(t) p(t) − p1
χ1 (t) , , χ2 (t) , ,
p2 − p1 p2 − p1
p2 − p(t + 1) p(t + 1) − p1
ψ1 (t) , , ψ2 (t) , .
p2 − p1 p2 − p1
40 Data-Rate-Constrained State Estimation and Control
and
p(t + 1) = ψ1 (t)p1 + ψ2 (t)p2 ,
P2 P2
respectively, where χi (t) ≥ 0, ψi (t) ≥ 0, i=1 χi (t) = 1 and i=1 ψi (t) = 1.
Moreover, one can further calculate that
2
X
Q(p(t)) = Qa + χi (t)pi Qb
i=1
and
2
X
Q(p(t + 1)) = Qa + ψi (t)pi Qb .
i=1
Based on the discussions made above, it is straightforward to turn out that 4(p(t)) =
P2 jkl
j,k,l=1 χj (t)χk (t)ψl (t)ϒ , which means that (2.31) is satisfied if (2.34) is met.
On the other hand, by some n algebraic manipulations,
o one has λmax {Q(p(t + 1))} ≤
T ˜
λmax {Q0 + p2 Qp } and E K̃ (t)K1 (t) ≤ λmax {5}I. Thus, we can now conclude
1
1−µ 1−µ
that limk→∞ E{kξk k2 } ≤ µ limk→∞ ρk+1 ≤ µ ρ̄ = γ , which finishes the proof
of this theorem.
Remark 2.1: Till now, we have handled the state estimation issue for a kind of
DTCNs subject to RONs under bit-rate constraints. Compared with the existing
results on the state estimation of DTCNs, our main results have the following
distinct characteristics: 1) a model of the bit-rate constraint is established for the
DTCN according to the allowable bandwidth of the communication network under
which an encoding-decoding mechanism is proposed; and 2) a general theoretical
framework is provided for the estimation error dynamics, by which the exponentially
ultimate boundedness is explored in the mean square sense. To be more specific, a
sufficient condition is established on the performance analysis in Theorem 2.1 where
the estimation error dynamics is exponentially mean square ultimately bounded.
Then, the probability-dependent state estimator design problem is given in Theorem
2.2. To get rid of the difficulty resulted from the time-varying probability, Theorem
2.3 subsequently provides a finite number of matrix inequalities by replacing the
time-varying probability by its known upper and lower bounds and the desired
estimator gain matrix is further obtained.
Gain-Scheduled State Estimation 41
Set the time-varying probability p(t) of RONs as p(t) = p1 + (p2 − p1 )| cos (k)|
with p1 = 0.3 and p2 = 0.9. Let the variances of the process noise wi (t) and the
measurement noise vi (t) as w̄i = 0.1 and v̄i = 0.1. The total available bit rate
of the DTCN is given as 18bps. According to the average allocation protocol,
the individual bit rate for each node is R1 = R2 = R3 = 6bps and the
quantization level is consequently calculated as q̄i = 64. The initial condition
of the system state ui (t) and its estimation are set as u1 (t) = [−0.10 0.14]T ,
u2 (t) = [−0.28 −0.10]T , u3 (t) = [1.7 0.15]T and ûi (t) = [0 0]T . By solving
the LMIs (2.34) with the help of the Matlab LMI toolbox, we obtain the
following estimator parameters:
42 Data-Rate-Constrained State Estimation and Control
T T
K11 = 0.2250 0.3776 , K12 = −0.1465 0.1798
T T
K21 = 0.4399 0.4323 , K22 = −0.3928 0.0480
T T
K31 = 0.1941 0.4535 , K32 = −0.2699 0.0605 .
0.4
0.2
0
0 50 100 150
0.5
-0.5
0 50 100 150
0
0 50 100 150
FIGURE 2.1
State trajectory ui1 (t) (i = 1, 2, 3) and its estimation.
Gain-Scheduled State Estimation 43
0.4
0.2
0 50 100 150
0.2
0.1
0
-0.1
0 50 100 150
0.5
0 50 100 150
FIGURE 2.2
State trajectory ui2 (t) ( = 1, 2, 3) and its estimation.
0.5
0 50 100 150
-1
0 50 100 150
0 50 100 150
FIGURE 2.3
Measurement output si (t) (i = 1, 2, 3) and its decoded value.
44 Data-Rate-Constrained State Estimation and Control
0.4
0.2
0
0 50 100 150
0.4
0.2
0
0 50 100 150
0.5
0
0 50 100 150
FIGURE 2.4
MSE of node i (i = 1, 2, 3).
0.2
-0.2
0 50 100 150
0.2
-0.2
0 50 100 150
0.2
-0.2
0 50 100 150
FIGURE 2.5
Decoding error s̃i (t) (i = 1, 2, 3).
Gain-Scheduled State Estimation 45
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0 50 100 150
FIGURE 2.6
The time-varying probability p(t).
2.4 Summary
This chapter has dealt with the gain-scheduled state estimation issue for
a kind of DTCNs with RONs under bit-rate constraints. In a resource-
constrained network circumstance, a bit-rate constraint model has been
established under which an encoding-decoding scheme has been given and
an upper bound of the decoding error has been acquired. The phenomenon
of RONs has been characterized by an array of Bernoulli random variables.
Sufficient conditions have been provided to ensure that the estimation error
dynamics is exponentially mean square ultimate bounded. The required
gain-scheduled state estimator gain matrix has been obtained in terms of
the solution to certain matrix inequalities. In the end, the usefulness of the
presented gain-scheduled state estimator design scheme has been validated
via a numerical simulation example.
3
Partial-Neurons-Based State Estimation for
Artificial Neural Networks under
Constrained Bit Rate: The Finite-Time Case
DOI: 10.1201/9781003534853-3 46
Partial-Neurons-Based State Estimation 47
nu nu
X X
u i (t + 1) = ai u i (t) + b ij p j (u j (t)) + dij qj (uj (t − π(t)))
j=1 j=1
(3.1)
i = 1, 2, · · · , n,
+ Ji (t) + li wi (t),
ui (r) = φi (r), r ∈ [−πM , 0]
where ui (t) ∈ R stands for the ith neuron’s state information and ai represents
the state feedback weight. pj (·) and qj (·) are the activation functions of neuron
j. wi (t) refers to a bounded exogenous disturbance satisfying kwi (t)k ≤ w̄i
with w̄i being a given scalar. For the ith neuron, the parameters bij and dij are
the connection weights for the non-delayed term pj (uj (t)) and the delayed
term qj (uj (t − πj (t))), respectively. Ji (t) is the external input of the ith neuron.
πj (t) is a positive integer denoting the time-varying delay of the jth neuron,
which satisfies πm ≤ πj (t) ≤ πM with πm and πm being known scalars.
Moreover, it is assumed that φi (r) is a given initial condition sequence.
In this chapter, among the nu neuron nodes, only a small fraction of
measurement outputs can be obtained. Without loss of generality, we employ
a set Na , {1, 2, . . . , ns } ⊂ {1, 2, . . . , nu } to denote the available measurements,
in which the element i ∈ Na corresponds to the ith neuron whose output is
measurable with the following form:
where si (t) is the measurement output collected by the ith sensor. vi (t) ∈ R
is an amplitude bounded disturbance sequence, that is kvi (t)k ≤ v̄i with v̄i
being a given scalar. ci and ri are given constant scalars.
For the activation functions pi ( · ) and qi ( · ) of the ith neuron, the following
assumption is given.
[pi (s1 ) − pi (s2 ) − hi1 (s1 − s2 )][pi (s1 ) − pi (s2 ) − hi2 (s1 − s2 )] ≤ 0,
[qi (s1 ) − qi (s2 ) − gi1 (s1 − s2 )][qi (s1 ) − qi (s2 ) − gi2 (s1 − s2 )] ≤ 0 (3.3)
for any s1 , s2 ∈ R, where hi1 , hi2 , gi1 and gi2 are known constants.
In order to facilitate the further development, we rewrite the component-
based artificial neural network model (3.1) to the following compact form:
(
u(t + 1) = Au(t) + Bp(u(t)) + Dq(u(t − π(t))) + J(t) + Lω(t),
(3.4)
u(r) = φ(r), r ∈ [−πM , 0]
Partial-Neurons-Based State Estimation 49
where
u(t) , vecnu {ui (t)}, p(u(t)) , vecnu {pi (ui (t))},
φ(r) , vecnu {φi (r)}, q(u(t)) , vecnu {qi (ui (t))},
A , diagnu {ai }, qπ (t) (u(t)) , vecnu {q(u(t − πi (t)))},
B , (bij )nu ×nu , D , (dij )nu ×nu ,
J(t) , vecnu {Ji (t)}, L , vecnu {li }.
Similarly, the augmented measurement output model of (3.2) is given as
follows:
where
In this chapter, due to the scarcity of the communication resource, the data
delivery from the sensor to the estimator is implemented through a channel
with limited bandwidth. To be more specific, it is assumed that the total
available bit rate of the communication media is R. According to the average
allocation protocol [68], the bit rate of each sensor-to-estimator transmission
channel is assigned as Ri , which means
ns
X
R= Ri . (3.6)
i=1
i −1)b
where gi = −b+ (2βN̄ , i = 1, 2, . . . , ns . It is easy to find that the measurement
i
output s(t) uniquely corresponds to a sub-hyperrectangle Iβ1 (b) × Iβ2 (b) ×
· · · × Iβns (b). Moreover, the distance between s(t) and the center of the
hyperrectangle Sb satisfies
v
u ns
uX 1
s(t) − θb (β1 , β2 , . . . , βns ) ≤ t b. (3.10)
i=1
22Ri
χR = β1 β2 . . . βn s . (3.11)
Partial-Neurons-Based State Estimation 51
Decoding Scheme:
Having received the generated codewords χR , the measurement output
s(t) is correspondingly decoded as
s̄(t) = ηb (χR )
(2βns −1)b T
h i
(2β −1)b (2β2 −1)b
= −b + 1R −b + · · · −b + . (3.12)
2 1 2R2 2Rns
Denote the decoding error as s̃(t) , s(t) − s̄(t) and it follows from (3.9)–(3.12)
that the decoding error s̃(t) is bounded by
v
u ns
uX 1
ks̃(t)k ≤ t b , b¯ . (3.13)
22Ri
i=1
where û(t) is the estimations of u(t) and K ∈ Rnu ×ns is the estimator gain
matrix to be determined later.
Setting ũ(t) , u(t) − û(t), one derives the following estimation error
dynamics:
(
ũ(t + 1) = Ãũ(t) + Bp̃(ũ(t)) + Dq̃(ũ(t − π(t))) + Eξ(t),
(3.15)
ũ(r) = φ̃(r), r ∈ [−πM , 0]
where
where ξ̄ , (ks + 1)(nu w̄2 + ns v̄2 + b̄), 0 ≤ ε1 < ε2 are known positive scalars
and S > 0 is a prescribed weighted matrix.
Assumption 3.2: The initial values of the error dynamics (3.15) meet the following
requirements ( T
ũ (i)Sũ(i) ≤ ε1
(3.17)
(ũ(i + 1) − ũ(i))T S(ũ(i + 1) − ũ(i)) ≤ ̟
for i = −πM , −πM + 1, · · · , −1, 0.
σ0 S ≤ Qj ≤ σ1 S, j = 1, 2, 3, (3.19)
(1 − α)t ρ2 + (1 − α)λmax {Q4 }ξ̄
≤ ε2 (3.20)
σ0
hold, where
α T α
Ŵ11 , A − KC − 1 − I Q1 + Q1 A − KC − 1 − I
2 2
+ (π + 1)Q2 − τ1 H ˜ 1,
˜ 2 , Ŵ16 , Q1 D, Ŵ17 , Q1 E,
Ŵ15 , Q1 B − τ1 H
(1 − α)τM
Ŵ18 , (A − KC − I)T , Ŵ22 = Ŵ23 = Ŵ34 = Ŵ44 , − Q3 ,
π
2(1 − α )τM
Ŵ33 , − Q3 − τ2 G˜ 1 , Ŵ36 , −τ2 G˜ 2 , Ŵ55 , −τ1 I,
π
Ŵ58 , BT , Ŵ66 , −τ2 I, Ŵ68 , DT , Ŵ77 , −Q4 , Ŵ78 , ET ,
(1 − α)πM
Ŵ88 , −Q −1 , Q , Q1 + π Q3 , π , πM − πm , µ , ,
π
ρ2 , (1 + πM + πM (πM − πm ))σ1 ε1 + (πM − πm )πM ̟ ,
1 1
H̃1 , (H1T H2 + HT2 H1 ), H̃2 , − (HT1 + HT2 ),
2 2
1 T 1
G̃1 , (G1 G2 + GT2 G1 ), G̃2 , − (GT1 + GT2 ),
2 2
H1 , diag{h11 , h21 , h31 }, H2 , diag{h12 , h22 , h32 },
G1 , diag{g11 , g21 , g31 }, G2 , diag{g12 , g22 , g32 }.
where
Then, calculating the difference along the trajectory of (3.15), one obtains
4
X
1V(t) = 1Vi (t) (3.22)
i=1
where 1Vi (t) , Vi (t + 1) − Vi (t). Next, terms 1Vi (t) + αVi (t) (i = 1, 2, 3, 4) are,
respectively, calculated as follows:
t−π
Xm
+ (1 − α)t−i ũT (i)Q2 ũ(i),
i=t−π(t+1)+1
Partial-Neurons-Based State Estimation 55
t−π
X m +1 t
X
1V3 (t) + αV3 (t) = (1 − α)t−i ũT (i)Q2 ũ(i)
j=t−πM +2 i=j
t−π
Xm t−1
X
− (1 − α)t−i−1 ũT (i)Q2 ũ(i)
j=t−πM +1 i=j
t−π
Xm t−1
X
+α (1 − α)t−i−1 ũT (i)Q2 ũ(i) (3.25)
j=t−πM +1 i=j
−πm
tX t
X t−1
X
= − (1 − α)t−i ũT (i)Q2 ũ(i)
j=t−πM +1 i=j+1 i=j
t−π
Xm
= πũT (t)Q2 ũ(t) − (1 − α)t−i ũT (i)Q2 ũ(i),
i=t−πM +1
k−π
Xm t
X
− (1 − α)t−i (ũ(i) − ũ(i − 1))T Q3 (ũ(i) − ũ(i − 1))
j=t−πM +1 i=j
t−π
Xm t
X
+α (1 − α)t−i (ũ(i) − ũ(i − 1))T Q3 (ũ(i) − ũ(i − 1))
j=t−πM +1 i=j
t−π
Xm t+1
X t
X
= − (1 − α)t−i+1
j=t−πM +1 i=j+1 i=j
T
× (ũ(i) − ũ(i − 1)) Q3 (ũ(i) − ũ(i − 1))
= π(ũ(t + 1) − ũ(t))T Q3 (ũ(t + 1) − ũ(t))
−πm
tX
− (1 − α)t−i+1 (ũ(i) − ũ(i − 1))T Q3 (ũ(i) − ũ(i − 1))
i=t−πM +1
Noting the nonlinear constraint for p(u(t)) and q(u(t)) in Assumption 3.1, one
further obtains
T
ũ(t) H̃1 H ˜2 ũ(t)
≤ 0, (3.28)
p̃(ũ(t − π(t))) ∗ I p̃(ũ(t))
T
ũ(t − π(t)) G̃1 G˜ 2 ũ(t − π(t))
≤ 0. (3.29)
q̃(ũ(t − π(t))) ∗ I q̃(ũ(t − π(t)))
where
h
η(k) , ũT (t) ũT (t − πm ) ũT (t − π(t)) ũT (t − πM )
iT
p̃T (ũ(t)) q̃T (ũ(t − π(t))) ξ T (t) ,
h i
, Â 0 0 0 B D E ,
Aˆ , A − KC − 1 − α I , Ŵ̃ , Ŵ̄ + T Q ,
2
Ŵ11 0 0 0 Ŵ15 Ŵ16 Ŵ17
∗ Ŵ22 Ŵ23
0 0 0 0
∗
∗ Ŵ 33 Ŵ 34 0 Ŵ 36 0
Ŵ̄ ,
∗ ∗ ∗ Ŵ44 0 0 0 .
∗
∗ ∗ ∗ Ŵ 55 0 0
∗ ∗ ∗ ∗ ∗ Ŵ66 0
∗ ∗ ∗ ∗ ∗ ∗ Ŵ77
Partial-Neurons-Based State Estimation 57
In terms of the Schur Complement Lemma, it follows from the condition (3.18) in
Theorem 3.1 that Ŵ̃ < 0 and thus one finds 1V(t) + αV(t) − ξ T (t)Q4 ξ(t) ≤ 0,
which further implies
.. (3.32)
.
t
X
≤ (1 − α)t+1 V(0) + (1 − α)t−i λmax {Q4 }ξ T (i)ξ(i)
i=0
, ρ2 .
It is easy to see from (3.22) that V(t) ≥ σ0 ũT (t)Sũ(t). On the basis of (3.19) and the
discussions made above, we have
Consequently, it follows from the definition (3.1) that the estimation error dynamics
(3.15) is finite-time bounded and the proof of this theorem is complete.
Theorem 3.2: For the ANN (3.4) with the bit-rate constraint (3.6), the
corresponding state estimation error dynamics (3.15) is finite-time bounded with
respect to (ε1 , ε2 , S, ξ̄ , ks ) if there exist positive matrices Qi (i = 1, 2, 3, 4), a matrix
X, some positive scalars α ∈ (0, 1), τi > 0 (i = 1, 2) and σi > 0 (i = 0, 1) such that
the following inequality constraints
58 Data-Rate-Constrained State Estimation and Control
Ŵ̂11 0 0 0 Ŵ15 Ŵ16 Ŵ̂17 Ŵ̂18
∗
Ŵ22 Ŵ23 0 0 0 0 0
∗
∗ Ŵ33 Ŵ34 0 Ŵ36 0 0
∗ ∗ ∗ Ŵ44 0 0 0 0
< 0,
Ŵ, (3.35)
∗
∗ ∗ ∗ Ŵ55 0 0 Ŵ̂58
∗
∗ ∗ ∗ ∗ Ŵ66 0 Ŵ68
∗ ∗ ∗ ∗ ∗ ∗ Ŵ77 Ŵ̂78
∗ ∗ ∗ ∗ ∗ ∗ ∗ Ŵ̂88
σ0 S ≤ Qj ≤ σ1 S, j = 1, 2, 3 (3.36)
(1 − α)t ρ2 + (1 − α)λmax {Q4 }ξ̄
≤ ε2 (3.37)
σ0
hold, where
α T α
Ŵ̂11 , Q1 A − XC − 1 − Q1 + Q1 A − XC − 1 − Q1
2 2
˜1
+ (π + 1)Q2 − τ1 H
˜ 2 , Ŵ16 , Q1 D, Ŵ̂17 , [Q1 L −XR −X],
Ŵ15 , Q1 B − τ1 H
Ŵ̂18 , (Q1 A − X1 C − Q1 )T ,
(1 − α)τM
Ŵ22 = Ŵ23 = Ŵ34 = Ŵ44 , − Q3 ,
π
2(1 − α)τM
Ŵ33 , − Q3 − τ2 G̃1 , Ŵ36 , −τ2 G˜ 2 , Ŵ55 , −τ1 I,
π
Ŵ̂58 , (Q1 B)T , Ŵ66 , −τ2 I, Ŵ̂68 , (Q1 D)T , Ŵ77 , −Q4 ,
Ŵ̂78 , [Q1 L −XR −X]T , Ŵ88 , Q − QT1 − Q1 .
K = Q1−1 X. (3.38)
1
Proof: Implementing the congruence transformation diag{I, I, I,I, I, I, I, Q−
1 } to
(3.35) results in
Ŵ̂11 0 0 0 Ŵ15 Ŵ16 Ŵ̂17 Ŵ18
∗
Ŵ22 Ŵ23 0 0 0 0 0
∗
∗ Ŵ33 Ŵ34 0 Ŵ36 0 0
∗ ∗ ∗ Ŵ44 0 0 0 0
<0
(3.39)
∗
∗ ∗ ∗ Ŵ55 0 0 Ŵ58
∗
∗ ∗ ∗ ∗ Ŵ66 0 Ŵ68
∗ ∗ ∗ ∗ ∗ ∗ Ŵ77 Ŵ78
∗ ∗ ∗ ∗ ∗ ∗ ∗ Ŵˆ 1
88
Partial-Neurons-Based State Estimation 59
1 , Q−T QQ−1 − Q−T − Q−1 and the other parameters are as the same
where Ŵ̂88 1 1 1 1
−1
as given in Theorem 3.1. Applying the useful inequality −Q −1 ≤ Q− T
1 QQ1 −
−T −1
Q1 − Q1 and (3.38), it is not difficult to see that (3.18) is true provided that
(3.35) is met. Therefore, according to the proof of Theorem 3.1, the desired finite-time
bounded requirement is accordingly achieved and the state estimator gain matrix can
be designed as K = Q−1 1 X. The proof of this theorem is now ended.
It is seen from the expression of matrix C that only the first and the second
neurons’ state information can be measured and the status of the third neuron
is unavailable, which is consistent with the theoretical analysis for the partial-
neuron-based state estimation problem. The nonlinear activation function
p( · ) and q( · ) are chosen as
−0.5u1 (t) + tanh (0.2u1 (t))
p(u(t)) = − tanh (0.45u2 (t)) + 0.65u2 (t) ,
tanh (0.7u3 (t)) + 0.3u3 (t)
−0.5u1 (t − π(t)) + tanh (0.2u1 (t − π(t)))
q(u(t − π(t))) = − tanh (0.45u2 (t − π(t))) + 0.65u2 (t − π(t)) .
tanh (0.7u3 (t − π(t))) + 0.3u3 (t − π(t))
60 Data-Rate-Constrained State Estimation and Control
t
Set the varying time delay as π(t) = 2 + 1+(−1 2
)
and consequently the upper
and lower bounds of π(t) are, respectively, chosen as πm = 2 and πM = 3.
The input signal is set as J(t) = [0.1 exp ( − t) 0 0.08 sin (t/2)]T . Let the
upper bound of the process disturbance wi (t) and the measurement noise
vi (t) take values over the interval [−0.5 0.5] uniformly and thus their upper
bounds are, respectively, given as w̄i = 0.5 and v̄i = 0.5. The total available
bit rate of the complex network is given as 24bps. According to the average
allocation protocol in [68], the individual bit rate for each neuron node is
R1 = R2 = R3 = 8bps and the quantization level is consequently calculated
as q̄i = 256.
The initial condition of the system state u(t) and its estimation are given as
u(t) = [−1 1.4 −0.8]T and û(t) = [0 0 0]T . Let the matrix S in Definition
3.1 be S = 0.1I. With the help of the Matlab toolbox, the matrix inequalities
in (3.35) can be solved and the estimator gain matrix is determined as
0.2683 0.1564
K = 0.0788 0.2607 .
0.3369 0.2755
0.5
-0.5
-1
-1.5
-2
-2.5
-3
-3.5
0 50 100 150 200 250
FIGURE 3.1
State trajectory u1 (t) and its estimation.
Partial-Neurons-Based State Estimation 61
1.5
0.5
-0.5
-1
-1.5
-2
-2.5
0 50 100 150 200 250
FIGURE 3.2
State trajectory u2 (t) and its estimation.
-1
-2
-3
-4
-5
-6
-7
-8
-9
0 50 100 150 200 250
FIGURE 3.3
State trajectory u3 (t) and its estimation.
62 Data-Rate-Constrained State Estimation and Control
-1
-2
0 50 100 150 200 250
0.5
0
0 50 100 150 200 250
-1
-2
50 100 150 200 250
FIGURE 3.4
Estimation error of neuron i (i = 1, 2, 3).
-2
-4
-6
-8
-10
-12
-14
0 50 100 150 200 250
FIGURE 3.5
The measurement output s1 (t) of the first neuron and its decoded value.
Partial-Neurons-Based State Estimation 63
-1
-2
0 50 100 150 200 250
FIGURE 3.6
The measurement output s2 (t) of the second neuron and its decoded value.
0.1
0.05
-0.05
-0.1
0 50 100 150 200 250
0.1
0.05
-0.05
-0.1
0 50 100 150 200 250
FIGURE 3.7
Decoding error s̃i (t) (i = 1, 2).
64 Data-Rate-Constrained State Estimation and Control
estimates. Figure 3.4 gives the estimation error of each neuron state.
Figures 3.5–3.6 describe the measurement output si (t) (i = 1, 2) of the first
and second neurons and their decoded values. Figure 3.7 plots the decoding
error for the measurement output s(t) of each neuron. It can be observed
from the above simulation results that the proposed partial-neurons-based
state estimation strategy achieves an acceptable estimation performance in
a bandwidth resource-constrained communication scenario with the aid of
the proposed encoding-decoding mechanism. Therefore, all the simulation
results well support the validness of the derived theoretical results.
3.4 Summary
In this chapter, the finite-time state estimation issue has been addressed
for a class of time-delayed ANNs subject to certain bit rate constraint. For
the purpose of meeting the network bandwidth requirement, a uniform-
quantization-based encoding-decoding mechanism has been applied to
encode the raw measurement outputs into specific digital codewords which
occupy fewer communication resource. During the design of the state
estimation scheme, only a small fraction of the neurons’ outputs have
been assumed to be measurable and utilized. By constructing a time-delay-
dependent Lyapunov functional, sufficient conditions have been established
to ensure the finite-time boundedness of the estimation error dynamics. The
desired estimator gain matrix has been obtained by solving certain matrix
inequalities. In addition, the effectiveness of the developed state estimator
has been further demonstrated by a numerical simulation.
4
Synchronization Control for a Class of
Discrete-Time Dynamical Networks with
Packet Dropouts: A Coding-Decoding-Based
Approach
DOI: 10.1201/9781003534853-4 65
66 Data-Rate-Constrained State Estimation and Control
quantization and encoding. To some extent, the data coding stage is most
crucial in realizing the digitization transmission since it is closely associated
with the detectability issue, that is, whether and how the coded data could
be recovered from the codewords with a prescribed accuracy requirement.
Compared with the traditional analog communication schemes, the
distinct features of the digital communication protocols lie in that they a)
have a good noise immunity; b) possess a high communication reliability;
and c) are convenient for the data encryption. Here, the features a) and b)
facilitate the long distant data transmission, and the feature c) prevents the
transmitted data from being vulnerable to attacks launched by adversaries
in response to the increasingly important security requirement of the
information transmission. In particular, it is significantly important to design
an appropriate coding-decoding procedure so as to ensure a satisfactory
control performance via digital communication channels.
In the past few years, the coding-decoding communication scheme has
gained some initial research attention. Up to now, almost all results
concerning the coding-decoding issues have been on linear/nonlinear
systems without network topology specifications, and the corresponding
results on dynamical networks have not been addressed yet despite their
wide applications in engineering practice.
The coding-decoding-based synchronization control problem for discrete-
time dynamical networks appears to be an essentially difficult issue with
three fundamental challenges identified as follows. 1) The first challenge
stems from the mathematical difficulty in analyzing the addressed problem.
As a typical dynamical network usually comes with both high dimension and
tight coupling among the nodes, rather complicated/difficult mathematical
analysis is expected and this is particularly true when the random
packet dropout phenomenon is taken into account during the codeword
transmissions [154]. On the other hand, due to the existence of the decoding
error between the decoded system state and actual system state, it is fairly
challenging to research into the issue of how to utilize imperfect decoded
information to attain the desired control objective. In addition, since the
performance of the coding-decoding protocol is influenced by a number
of factors (e.g. the coding period, the size of the coding alphabet and the
probabilistic packet dropouts), the third challenge is how to examine the
effects of these combined factors on the prescribed system performance
indices. It is, therefore, the main aim of this chapter to deal with the listed
challenges by addressing the synchronization control problem for dynamical
networks using a coding-decoding-based approach.
N
X
1)
x i (k + = f (x i (k)) + wij Ŵxj (k) + ui (k),
j=1
(4.1)
yi (k) = Ci xi (k),
xi (0) = xi0 ∈ X0 , i = 1, 2, . . . , N
where, for the ith node, xi (k) ∈ Rn is the state vector which is inaccessible
directly, and yi (k) ∈ Rm and ui (k) ∈ Rn are the measurement output and
the control input, respectively. Ŵ = diag{γ1 , γ2 , . . . , γn } is the inner coupling
matrix linking the jth state variable if γj 6 = 0. W = [wij ]N×N is the coupled
configuration matrix of the network with wij ≥ 0 (i 6 = j) but not all zero. xi0 is
the initial value of the ith node belonging to a known set X0 . Ci is a constant
matrix of appropriate dimensions. The nonlinear vector-valued function
f ( · ) : Rn 7 → Rn is continuous which satisfies f (0) = 0 and the following
condition:
N
X
1
x̃
i
(k + ) = f (x̃ i (k)) + wij Ŵx̃j (k)
j=1
(4.3)
+ Li (yi (k) − Ci x̃i (k)) + ui (k),
x̃i (0) = x̃i0 ∈ X0
where x̃i (k) ∈ Rn is the estimator state for the ith node, Li ∈ Rn×m is the
estimator gain matrix to be designed and x̃i0 is the ith estimator’s initial
condition.
Let s(k) ∈ Rn be the solution to the unforced isolate node
(
s(k + 1) = f (s(k)),
(4.4)
s(0) = s0 ∈ X0
N
X
esi (k + 1) = f (esi (k)) +
wij Ŵesj (k) + ui (k),
j=1 (4.5a)
esi (0) = esi0 ∈ X0
where f (esi (k)) , f (xi (k)) − f (s(k)) and esi0 , xi0 − s0 is the initial value.
To comply with the digital communication fashion, the purpose of this
chapter is to address the synchronization control problem for the dynamical
network (4.1) by using a coding-decoding communication protocol. To be
exact, by developing an efficient coding-decoding procedure based on the
estimated network states, we shall design a decoder-based control protocol
such that all the network nodes can be synchronized to the dynamics (4.4).
Before proceeding, a general form of the coding-decoding procedure for
dynamical networks (4.1) is given as follows:
Coder for Node i:
X̂i (lh) = Gil (αi (h)gi (h), αi (2h)gi (2h), . . . , αi (lh)gi (lh)) (4.7)
X̂i (lh) , {x̂i (lh), x̂i (lh + 1), . . . , x̂i ((l + 1)h − 1)}
with x̂i (k) being the decoded state of x̃i (k) for k ∈ [lh, (l+1)h). Fli (·) and Gil (·) are
coder and decoder functions to be designed, respectively. αi (lh) is a Bernoulli
distributed random variable which characterizes the packet dropouts and
satisfies the following probability distribution:
where ᾱi ∈ [0, 1] is a given scalar. In addition, αi (lh) and αj (lh) are mutually
independent random variables for i 6 = j with i, j = 1, 2, . . . , N.
For node i, in terms of the decoded state x̂i (k), the decoder-based
synchronization controller is given as
Definition 4.1: Consider the discrete-time dynamical network of the compact form
(4.10) subject to packet dropouts during the codeword transmissions. The network
(4.10) is said to be detectable if there exist families of coder-decoder pairs (4.6) and
(4.7) with a coding alphabet H of size χ such that
4.2.1 Preliminaries
To start with, we give the following useful lemma which will be needed for
the subsequent derivation of our main results.
Synchronization Control for a Class of Discrete-Time Networks 71
Lemma 4.1: Let the scalar µ1 > 0 be given. If there exist a positive definite matrix
P > 0 and a scalar ε1 > 0 satisfying the following linear matrix inequality (LMI)
−511 −ε1 8T23 (W ⊗ Ŵ)T P
51 = ∗ −ε1 INn P < 0, (4.15)
∗ ∗ −P
then we have
Proof: First, denoting z(k) , v1 (k) − v2 (k) and F(z(k)) , F(v1 (k)) − F(v2 (k)), it
can be inferred immediately from (4.10) that z(k+1) = F(z(k))+(W⊗Ŵ)z(k). Then,
consider the Lyapunov function V(k) = zT (k)Pz(k). The term 1V(k) − µ1 V(k),
where 1V(k) is the difference of V(k) along the dynamics of z(k + 1) = F(z(k)) +
(W ⊗ Ŵ)z(k), can be subsequently calculated as
U1T U2 +U2T U1
where 813 = IN ⊗ 81 , 823 = IN ⊗ 82 , 81 = 2 and 82 = − U1 +2 U2 .
Then, substituting (4.18) into (4.17) yields
¯ 1 ξ1 (k)
= ξ1T (k)5
where
T
ξ1 (k) = zT (k) FT (z(k)) ,
72 Data-Rate-Constrained State Estimation and Control
5¯ 11 (W ⊗ Ŵ)T P − ε1 8T23
¯1 =
5
∗ P − ε1 INn
Lemma 4.2: Let the positive scalar 0 < µ2 < 1 be given and consider the dynamical
network (4.10) with estimator (4.11). It is assumed that there exist a positive definite
matrix Q = diagN {Qi } > 0, a matrix X = diagN {Xi } and a positive scalar ε2 > 0
satisfying
−(1 − µ2 )Q − ε2 813 T
−ε2 823 Q̄
Q <0 (4.20)
52 = ∗ −ε2 INn
∗ ∗ −Q
where Q̄ = (Q(W ⊗ Ŵ) − XC)T . Then, for the augmented dynamical network (4.10)
and estimator (4.11), there always exist an integer h ∈ Z+ and a scalar c1 (0 < c1 < 1)
such that
kx(k + h) − x̃(k + h)k2 < c1 kx(k) − x̃(k)k2 . (4.21)
Moreover, the desired estimator gain matrix for each node can be obtained in the
form of
1
Li = Q −
i Xi , i = 1, 2, . . . , N. (4.22)
Proof: Following the similar line in the proof of Lemma 4.1, we denote the estimation
error as e(k) , x(k) − x̃(k). Then, subtracting (4.11) from (4.10) results in the
estimation error dynamics
where
T
ξ2 (k) = eT (k) FT (e(k)) ,
5¯ 21 (W ⊗ Ŵ − LC)T Q − ε2 8T
¯
52 = 2 3
∗ Q − ε2 INn
q
where c1 = (1−µλ2 ) λ{Q}
h
max {Q}
. Therefore, it is not difficult to verify that there always
min
exists a proper integer h to ensure 0 < c1 < 1. The proof of Lemma 4.2 is complete.
(j)
where δi is the jth element of the vector δi . As a result, for each Bai , the center
of the hyperrectangle Ii1i (ai ) × Ii2i (ai ) × · · · × Iini (ai ) can be defined as
s1 s2 sn
T
ηai i (si1 , s2i , . . . , sin ) , bi1 bi2 · · · bin (4.29)
(2sij −1)ai
where bij = −ai + q , j = 1, 2, . . . , n.
Synchronization Control for a Class of Discrete-Time Networks 75
Hence, for any δi ∈ Bai , there exist unique integers si1 , s2i , . . . , sin ∈ {1, 2, . . . , q}
such that δi ∈ Ii1i (ai ) × Ii2i (ai ) × · · · × Iini (ai ), which amounts to the following
s1 s2 sn
√
nai
kδi − ηai i (si1 , si2 , . . . , sni )k2 ≤ . (4.30)
q
ij
In the coding-decoding procedure to be proposed, each segment I i (ai )
sj
(j = 1, 2, . . . , n) of the hyperrectangle Bai determines an integer sji , which is
one component of the codeword. So, the transmitted codeword corresponds
to a certain integer sequence s11 , . . . , s1n , s21 , . . . , s2n , . . . , sN N
1 , . . . , sn , which is
vitally important to the decoding procedure.
Assume that Lemma 4.1 and Lemma 4.2 hold for some proper constants
c0 and c1 , respectively. The following specific form of coding-decoding
procedure is proposed to handle the detectability analysis problem for the
ith node.
Coder for Node i: For δi (lh) , x̃i (lh) − x̄i (lh) ∈ Ii1i (ai (lh)) × Ii2i (ai (lh)) × · · · ×
s1 s2
Iini (ai (lh)) ⊂ Bai (lh) , we have
sn
x̄i (0) = 0,
x̄i (k) = x̂i (k), k 6 = lh,
(4.32)
N
X
x̄i (lh) = f (x̂i (lh − 1)) + wij Ŵx̂j (lh − 1) + ui (lh − 1).
j=1
x̂i (0) = 0,
N
X
x̂i (k + 1) = f (x̂i (k)) + wij Ŵx̂j (k) + ui (k), k 6 = lh − 1, (4.33)
j=1
Coder: For δ(lh) , x̃(lh) − x̄(lh) ∈ I111 (a1 (lh)) × · · · × I11n (a1 (lh)) × I212 (a2 (lh)) ×
s1 sn s1
2 n N 1 Nn
· · · × I 2 (a2 (lh)) × · · · × I N (aN (lh)) × · · · × I N (aN (lh)) ⊂ Ba(lh) , we have
sn s1 sn
where Ba(lh) = {x(lh) ∈ RNn : |x(j) (lh)| < a(lh), j = 1, . . . , Nn} and x̄(lh) =
vecN {x̄i (lh)} is defined by
x̄(0) = 0,
x̄(k) = x̂(k), k 6= lh, (4.35)
x̄(lh) = F(x̂(lh − 1)) + (W ⊗ Ŵ)x̂(lh − 1) + u(lh − 1).
Decoder:
x̂(0) = 0,
x̂(k + 1) = F(x̂(k)) + (W ⊗ Ŵ)x̂(k) + u(k), k 6= lh − 1, (4.36)
x̂(lh) = x̄(lh) + α(lh)ηa(lh) (s11 , . . . , snN )
where a(lh) = max1≤i≤N {ai (lh)}, α(lh) = diagN {αi (lh)In } and ηa(lh) (s11 , . . . ,
sN i i i i
n ) = vecN {ηai (lh) (s1 , s2 , . . . , sn )}.
In the following, some definitions are given to facilitate the subsequent
developments.
Proof: This lemma can be proved by using the mathematical induction. First, for
l = 1, by considering Lemma 4.1, Lemma 4.2 and the property of vector norm, we
have
Synchronization Control for a Class of Discrete-Time Networks 77
which guarantees
E{kx̃(lh) − x̄(lh)k∞ } ≤ a(lh). (4.40)
√
Subsequently, assuming that E{kx̃(jh) − x̄(jh)k∞ } ≤ NnE{a(jh)} for all j = 2,
. . . , l, we arrive at
Since the codeword loss occurs in a random way for each node and is governed
by a set of mutually independent Bernoulli distributed sequence αi (lh), the term
kx̃(lh) − x̄(lh) − α(lh)ηa(lh) (s11 , . . . , sN
n )k2 in (4.42) can be further rewritten as
where the first term on the right-hand side of (4.43) implies the case that there is
no packet dropout occurring during the codeword transmissions, the second term
describes that only one node is subject to the codeword loss and the last term indicates
that all the nodes lose the codewords at the transmission stage.
For presentation convenience, only some cases of packet dropouts for the dynamical
network are described in (4.43). Specifically, without loss of generality, we assume
that the first m nodes suffer from the packet dropouts where m ∈ {1, 2, . . . , N}. Then,
we have
˜
= x(lh) ¯
− x(lh) − ηa(lh) (s11 , . . . , snN )
+ [ηa1T mT
1 (lh) , . . . , ηam (lh) , 0, . . . , 0]
T
| {z } | {z } 2
m N−m
√ a(lh) √ a(lh)
≤ Nn + Nn a(lh) −
q q
√
= Nna(lh).
It is not difficult to verify that, if we consider the case of packet dropouts for arbitrary
m nodes, the above result still holds. Accordingly, it can be derived from (4.42)–(4.44)
that
p √ α¯
E{kx(lh) − x̂(lh)k2 } ≤ 2cl1 Ns0 + Nn E {a(lh)}
q (4.45)
√
+ Nn (1 − ᾱ) E {a(lh)} .
Thus, it can be concluded from (4.37), (4.41) and (4.45) that
E kx̃((l + 1)h) − x̄((l + 1)h)k2 ≤ a((l + 1)h), (4.46)
which means
E kx̃((l + 1)h) − x̄((l + 1)h)k∞ ≤ a((l + 1)h). (4.47)
Consequently, it follows that the Lemma 4.3 holds for all l ≥ 1, and the proof of this
lemma is complete.
Synchronization Control for a Class of Discrete-Time Networks 79
Theorem 4.1: The dynamical network (4.10) is detectable with the coding-decoding
procedure (4.34)-(4.36) if the inequality
ᾱ √
+ 1 − α¯ Nnch0 < 1 (4.48)
q
holds subject to (4.15) and (4.20) for some positive integer q, where c0 and h satisfy
Lemma 4.1 and Lemma 4.2, respectively.
Proof: It follows from (4.37), (4.48) and 0 < c1 < 1 that liml→+∞ E{a(lh)} = 0,
which indicates
lim E{kx̃(lh) − x̄(lh)k2 } = 0. (4.49)
l→∞
Then, it can be easily seen from (4.45) that, at each coding instant lh, we have
lim E{kx(lh) − x(
ˆ lh)k2 } = 0. (4.50)
l→∞
On the other hand, when lh < k < (l + 1)h, noticing that x(k) and xˆ(k) can be
viewed as two solutions of (4.10), one finds E{kx(k) − x̂(k)k2 } ≤ ck0−lh E{kx(lh) −
x̂(lh)k2 } by Lemma 4.1, which implies that E{kx(k) − x̂(k)k2 } is also bounded at
non-coding instants. Therefore, it follows immediately from the above analysis that
Remark 4.2: In Theorem 4.1, a criterion has been established to ensure the
detectability of the dynamical network (4.10). It is not difficult to find that all the
information (including the system matrices, the coding period, the size of coding
alphabet and the statistics characteristics of packet dropouts) are reflected in the
condition (4.48). Hence, the detectability of the dynamical network (4.10) depends
heavily on the combined influences of those factors mentioned above. Let us now
evaluate the impact on the performance of the proposed coding-decoding
√
protocol
α¯ Nnc0h
from the following three aspects. 1) From (4.48), one has q > √ , which
¯ Nnch0
1−(1−α)
√
(α¯ Nnch0 )Nn
requires that the size of the coding alphabet H should satisfy χ> √ .
(1−(1−α)¯ Nnc0h )Nn
√
q Nnc−h −1
inequality (4.48) also indicates 1 − ᾱ < 0
q−1 . Recalling the definition of ᾱ, it
is noticed that the term 1 − ᾱ can be regarded as the total packet dropout probability
of the whole network. Therefore, it is√easily seen that the upper bound of admissible
q Nnc−h −1
0
data packet dropout probability is q−1 . 3) For a given size χ of the coding
alphabet H, with increased packet dropout probabilities ᾱi , the ᾱ becomes smaller
and thus inevitably weakens the feasibility of the inequality (4.48) and even leads to
the possible divergence of the coding-decoding algorithm. Accordingly, this gives a
trade-off between the packet dropout probabilities and the convergence of the proposed
algorithm.
where x(k) ∈ Rn is the system state vector, u(k) ∈ Rp is the control input and
f (·, ·) : Rn × Rp 7→ Rn is a continuous function satisfying f (0, 0) = 0.
First, let us introduce some important function classes which will be used
in the subsequent developments. K, K∞ and KL denote the different classes
of functions. A function γ (·) : R+ 7 → R+ belongs to class K if it is a continuous
strictly increasing function with γ (0) = 0 and belongs to class K∞ if γ ( · ) ∈ K
with γ (r) 7 → ∞ as r 7 → ∞. Also, a function σ (s, k) : R+ × R+ 7 → R+ belongs
to class KL if, for each fixed k, the function σ (·, k) ∈ K, and for each fixed s,
the function σ (s, ·) is decreasing and σ (·, k) 7 → 0 as k 7→ ∞. A function is said
to be a K (K∞ or KL) class function if it belongs to the class K (K∞ or KL).
Definition 4.3: The system (4.52) is said to be input-to-state stable if there exist a
KL class function β(·, ·) and a K class function γ ( · ) such that the evolution of the
system state x(k) satisfies
Remark 4.3: It is clear from (4.53) that the bound of the state x(k) is closely
associated with the initial condition x(0) and the system input u(k). To be specific, if
the system input u(k) is bounded, then the state evolution trajectory x(k) is naturally
bounded. Also, it follows from the properties of functions β(·, ·) and γ ( · ) that the
state x(k) is ultimately bounded as k increases. In addition, as pointed out in [58], the
ISS property further implies the case of “converging-input” to “converging-state”,
that is, the system state x(k) converges to 0 if the input u(k) achieves 0 as k 7→ ∞.
Lemma 4.4: [58] The nonlinear discrete-time system (4.52) is said to be input-to-
state stable if there exist a positive definite function V(k, x(k)) : [0, +∞) × Rn 7→ R
(called an ISS-Lyapunov function), three K∞ class functions α1 (·), α2 (·) and α3 (·),
and a K class function ̟ ( · ) such that the following two inequalities
hold for all x(k) ∈ Rn and u(k) ∈ Rp . Furthermore, if the above two inequalities
are met simultaneously, then the functions β(·, ·) and γ ( · ) in Definition 4.3 can be
selected as β(·, k) = α1−1 (φ k α2 ( · )) (0 < φ < 1) and γ ( · ) = α1−1 (α2 (α3−1 (̟ ( · )))),
respectively, where α1−1 ( · ) expresses the inverse function of the monotone function
α1 ( · ) and so does α3−1 ( · ).
Definition 4.3 and Lemma 4.4 reveal the relationship between the system
state evolution and the bound of inputs. On the other hand, based on the
obtained detectability analysis results, we have that the decoding error w(k)
is bounded. In this sense, w(k) can be viewed as a bounded input of (4.57) and
therefore the introduced ISS theory can be utilized to investigate the coding-
decoding-based synchronization control problem.
82 Data-Rate-Constrained State Estimation and Control
Theorem 4.2: Under the condition in Theorem 4.1, the dynamical network (4.10)
can be synchronized by the decoder-based controller (4.56) if there exist a positive
definite matrix R = IN ⊗ R0 > 0, a matrix Y = IN ⊗ Y0 and a positive scalar ε3 > 0
satisfying
−R − ε3 813 −ε3 8T23 0 R̄T
∗ −ε3 INn 0 R <0
53 =
(4.58)
∗ ∗ −R YT
∗ ∗ ∗ −R
where R̄ = (R(W ⊗ Ŵ) + Y). Moreover, the desired controller gain matrix is given as
Kc = R−1
0 Y0 . (4.59)
Proof: Choosing the ISS-Lyapunov function as V(k) = eTs (k)Res (k) and calculating
its difference along the trajectory of (4.57), one obtains
T
V(k + 1) − V(k) ≤ (K̄c + (W ⊗ Ŵ))es (k) + F(es (k)) + K̄c w(k) R
× (K̄c + (W ⊗ Ŵ))es (k) + F(es (k)) + K̄c w(k)
T
es (k) 813 82T3
− esT (k)Res (k) − ε3 (4.60)
F(es (k)) ∗ INn
es (k)
×
F(es (k))
= ξ3T (k)5̄3 ξ3 (k) + wT (k)Rw(k)
where
T
ξ3 (k) = eTs (k) FT (es (k)) wT (k) ,
5 ¯ 31 KT R − ε3 8T KT K̄c
33
5̄3 = ∗ R − ε3 INn K¯ c
∗ ∗ T
K̄c RK̄c − R
s
λmax {R} k
kes (k)k2 ≤ φ kes0 k2
λmin {R}
s (4.61)
λ2max {R}
+ kw(k)k2 .
cλmin {R}λmin {−5¯ 3}
Then, it is easy to see that the nonlinear function f ( · ) satisfies the sector
bounded condition (4.2) with
−0.5 −0.15 0.15 −0.15
U1 = , U2 = .
0 1.1 0 0.25
Example 4.1: In this example, according to our established criterion, we shall test
the detectability problem for the dynamical network (4.1). In this case, without
loss of generality, it is assumed that u(k) ≡ 0. Choosing µ1 = 0.3 and
solving the matrix inequality (4.15) by the Matlab software, we have that (4.16)
holds with c0 = 1.2701. For the given scalar µ2 = 0.1 and the coding
period h = 3, c1 = 0.9435 is obtained such that (4.21) holds. Moreover,
T
the estimator gain matrices Li are obtained as L1 = −0.3476 0.8462 ,
T T
L2 = −0.4161 1.0285 and L3 = −0.3223 0.8768 . According to Theorem
4.1, the packet probability ᾱi (i = 1, 2, 3) is taken as 0.1 for q = 20.
To validate our analysis results and make our simulation non-trivial, we
consider the above dynamical network which is set to be unstable. The simulation
results are shown in Figures 4.1–4.3, where Figures 4.1–4.2 plot the actual
states and their decoded values for all the nodes of the network (4.1) and
Figure 4.3 shows the corresponding decoding errors wij (k) (i = 1, 2, 3;
j = 1, 2). It is noticed from Figure 4.3 that the errors between the actual states of
the whole network and their decoded states asymptotically approach zero. Therefore,
50
−50
0 10 20 30 40 50 60 70 80 90
50
−50
0 10 20 30 40 50 60 70 80 90
200
−200
0 10 20 30 40 50 60 70 80 90
FIGURE 4.1
State trajectories xi1 (k) and their decoded values x̂i1 (k) (i = 1, 2, 3).
Synchronization Control for a Class of Discrete-Time Networks 85
500
−500
0 10 20 30 40 50 60 70 80 90
500
−500
0 10 20 30 40 50 60 70 80 90
−1000
−2000
0 10 20 30 40 50 60 70 80 90
FIGURE 4.2
State trajectories xi2 (k) and their decoded values x̂i2 (k) (i = 1, 2, 3).
15
10
5
Decoding errors
−5
−10
−15
−20
0 10 20 30 40 50 60 70 80 90
k/time step
FIGURE 4.3
Decoding errors wij (k) (i = 1, 2, 3; j = 1, 2).
86 Data-Rate-Constrained State Estimation and Control
20
−20
−40
−60
0 10 20 30 40 50 60
1000
500
−500
0 10 20 30 40 50 60
FIGURE 4.4
State trajectories xij (k) of the uncontrolled nodes i (i = 1, 2, 3; j = 1, 2).
Synchronization Control for a Class of Discrete-Time Networks 87
20
−20
−40
−60
0 10 20 30 40 50 60
1000
500
−500
0 10 20 30 40 50 60
FIGURE 4.5
State trajectories xij (k) of the controlled nodes i (i = 1, 2, 3; j = 1, 2).
control signal to the dynamical network. Figure 4.5 shows that all the state response
curves of the controlled network can synchronize to the isolate node according to the
proposed control protocol. Therefore, the simulation examples have confirmed our
theoretical analysis very well.
4.4 Summary
This chapter has dealt with the synchronization control problem for a class
of dynamical networks in a coding-decoding framework. By employing a
modified uniform quantization approach, a set of coder-decoder-controller
pairs has been designed to comply with the digital communication
fashion. With the help of ISS theory, sufficient conditions have been
derived for the closed-loop network to achieve the desired synchronization
performance and the explicit expression of the controller gain matrix has
been characterized in terms of the solution to certain LMIs. Finally, two
illustrative examples have highlighted the detectability of the addressed
dynamical network and the effectiveness of the synchronization control
protocol presented in this chapter.
5
Observer-Based Consensus Control for
Discrete-Time Multi-Agent Systems with
Coding-Decoding Communication Protocol
The past few decades have witnessed particular research interests in the
problems of collective behaviors (e.g. consensus, flocking and swarming)
of networked multiple autonomous agents for their broad applications on
various aspects of engineering systems including cooperative control for
multi-robot systems, coordination of distributed sensor networks, formation
control of unmanned air vehicles and satellite flying, to name just a few. In
order to reach the goal of the coordination control for the individual agent in
a networked environment, a pivotal issue is how to develop certain simple
yet efficient distributed control protocols (or algorithms) only by sharing
the local information between the adjacent agents. Because of its theoretical
importance in distributed computing and application potentials in practical
engineering, the consensus problem has long been an active research topic
with a great many results reported in the literature.
It should be mentioned that almost all existing literature on the consensus
control problems for MASs has been based on the assumption that the signals
can be directly transmitted in an analog manner with infinite precision. Such
an assumption is, however, sometimes too stringent because the signals are
usually digitalized before being sent in a networked environment. As opposed
to the traditional analog communication scheme, the digital communication
strategy enjoys the distinct merits of well interference rejection capability,
high security as well as reduced power consumption, and has therefore
become increasingly popular in nowadays prevalent networked control
systems (NCSs). Roughly speaking, there are four steps in an analog-to-
digital (A/D) conversion, namely, sampling, reservation, quantization and
encoding. It is worth pointing out that, compared with sampling and
quantization issues, the signal encoding problem has received much less
research attention in the context of NCSs.
In NCSs, the limited communication resource (e.g. channel bandwidth)
is well known to be the main cause for quality deterioration of signal
transmissions and performance degradation of control systems . Especially,
DOI: 10.1201/9781003534853-5 88
Observer-Based Consensus Control 89
where xi (k) ∈ Rn , yi (k) ∈ Rm and ui (k) ∈ Rp are, respectively, the state vector,
the measurement output and the control input of the ith agent. xi0 ∈ Rn is a
given initial condition. A, B and C are known real matrices with appropriate
dimensions.
In most existing results regarding the MASs, a common assumption is that
the relative full state information for each agent is available from itself and
its adjacent agents, which is defined by
X
ξi (k) , aij (xj (k) − xi (k))
(5.2)
j∈Ni
P
with the initial condition ξi (0) = si0 , where si0 = j∈Ni aij (xj0 − xi0 ). However,
from an engineering point of view, the relative full state information is often
unavailable in reality. Hence, for agent i, it is assumed that only the relative
measurement output of neighboring agents is obtained as follows:
X
ỹi (k) , aij (yj (k) − yi (k)).
(5.3)
j∈Ni
with the initial condition ξ̂i (0) = ŝi0 , where ŝi0 is a known vector. Moreover,
the control input ui (k) in (5.4) is given as ui (k) = Kξ̂i (k), where K is the
controller gain to be determined.
where ξ̌i (k) ∈ Rn is the decoded signal generated by decoder i. Based on such
a fact, the control input ui (k) = Kξ̂i (k) in the observer (5.4) should be replaced
by (5.7). On the other hand, it should be pointed out that, owing to the
constraint of the network bandwidth, it is unrealistic and impossible to feed
the decoded signal ξ̌i (k) back to the state estimator side, which means that
the decoded state ξ̌i (k) cannot be directly utilized to construct state observer
(5.4). Therefore, an auxiliary control input ŭi (k) defined in the next section
(see (5.31)) is introduced to establish the following observer:
X
ξ̂i (k + 1) = Aξ̂i (k) + B aij (ŭj (k) − ŭi (k)) + L(ỹi (k) − Cξ̂i (k))
(5.8)
j∈Ni
subject to the initial condition ξ̂i (0) = ŝi0 , where ŝi0 is a known vector. As
will be shown in the later developments, the auxiliary control input ŭi (k)
equals ui (k) ∀k ≥ 0. Therefore, by letting ξ̃i (k) , ξi (k) − ξ̂i (k), it follows
from (5.2) and (5.8) that the following estimation error dynamics for agent i
is derived:
Lemma 5.1: ([135]). Given a matrix A = [aij ]n×n , where aii ≤ 0, aij > 0 (∀i 6= j)
P
and nj=1 aij = 0 for each i. Then, A has at least one zero eigenvalue and all of the
nonzero eigenvalues are in the open left half plane. Furthermore, A has exactly one
zero eigenvalue if and only if the directed graph associated with A has a spanning tree.
Subsequently, from (5.2) and (5.7), the augmentation of the dynamics ξi (k)
can be obtained with the following form:
Moreover, denote ξE (k) , ξ(k) − ξ̌ (k) and rewrite u(k) , (IM ⊗ K)(ξ(k) − ξE (k)).
By augmenting the system state xi (k), we obtain the closed-loop system as
follows:
By setting x̃i (k) , xi (k) − x̄(k) and x̃(k) , colM {x̃i (k)}, it is inferred from (5.12)
and (5.14) that the deviation from each agent’s state xi (k) to the weighted
average state x̄(k) is calculated with a compact form as follows:
where H = [hij ]M×M with hij = 1 − η1j for i = j and hij = −η1j for i 6 = j.
Subsequently, along the same line as in [84], denote 3 by the Jordan form
associated with the Laplace matrix LG , for example P−1 LG P = 3, where
P = [p1 p2 . . . pM ] ∈ CM×M and P−1 = [q1 q2 . . . qM ]T ∈ CM×M are
nonsingular matrices with pi ∈ CM and qi ∈ CM being the M-
dimensional complex vectors for i = 1, 2, . . . , M. Different from the case of
undirected graph G where LG is symmetric and 3 is a diagonal matrix,
for a directed graph G , LG could be a non-symmetric matrix whose
eigenvalues are complex and 3 is no more diagonal but with the form
3 = diag{31 , 32 , . . . , 3r }, where 3i ∈ CMi ×Mi is a Jordan block
λi 1 0 0
0 .. ..
. . 0
3i = . (5.16)
0 ..
0 . 1
0 0 0 λi M ×M
i i
where 3̃ = diag{32 , . . . , 3r }.
94 Data-Rate-Constrained State Estimation and Control
Definition 5.2: Suppose that the directed graph G of the communication network
contains a directed spanning tree. The discrete-time MASs (5.1) is said to reach the
asymptotic consensus if
Lemma 5.2: Suppose that the directed graph G of the communication network
contains a directed spanning tree. The MAS (5.1) reaches the asymptotic consensus
if the component δ̃i (k) in (5.17b) satisfies
for i = 2, . . . , r.
Pi−1
Proof: First, define p̃1 = p1 and p̃i , [pαi +1 pαi +2 · · · pαi +Mi ] with αi = s=1 Ms
| {z }
Mi
for i = 2, . . . , r. Thus, the matrix P can be rewritten as P = [˜p1 p˜ 2 · · · p˜ r ], and
then it follows from δ(k) = (P−1 ⊗ In )x̃(k) and ζ1 (k) = 0 that
Lemma 5.3: Let the positive scalar ǫ be given. If there exists a positive definite
matrix R > 0 satisfying
is satisfied, where c0 > 0 is a positive scalar, and ϕ(k) and φ(k) are two trajectories
of system (5.11).
Proof: First, denoting z(k) , ǫ −k (ϕ(k) − φ(k)), it is readily seen from (5.11) that
z(k + 1) = ǫ −1 (IM ⊗ A)z(k). Then, by choosing the quadratic function V1 (k) =
ǫ 2 zT (k)Rz(k), we calculate the difference along the trajectory of z(k) as follows:
Defining λ0 , λmin {−50 }, λ̄1 , λmax {R} and λ1 , λmin {R}, one has 1V1 (k) ≤
−λ0 λ̄1−1 ǫ −2 V1 (k), which further indicates that |ϕ(k+1)−φ(k+1)| ≤ c0 |ϕ(k)−φ(k)|
1 −2 − 1 1 /2
with c0 = ǫ((1 − λ0 λ̄− 1 ǫ )λ̄1 λ1 ) . The proof is now complete.
Lemma 5.4: Let the positive scalar 0 < µ < 1 be given. Consider the augmented
estimation error system (5.13). If there exist a positive definite matrix S̄ > 0 and a
matrix X̄ satisfying
−(1 − µ)S (IM ⊗ (SA ¯ −X ¯ C))T
51 , <0 (5.24)
∗ −S
Moreover, the desired observer gain matrix for (5.9) can be obtained with the form of
L = S¯ −1 X̄. (5.26)
Proof: First, by selecting the quadratic function V2 (k) = ξ̃ T (k)Sξ̃ (k) for (5.13)
and defining its difference as 1V2 (k) , V2 (k + 1) − V2 (k), we calculate the term
1V2 (k) + µV2 (k) along the trajectory of (5.13) as
It is inferred from (5.24), (5.26) and the Schur Complement Lemma that
where µ̄1 = λmax {S} and µ1 = λmin {S}. Therefore, one further has
with c1 = (µ1−1 µ̄1 (1 − µ)h )1/2 . Noting the fact that 0 < µ < 1, there must exist a
positive integer h ensuring 0 < c1 < 1, which completes the proof of this lemma.
ij (j) (j) 2ai
I1 (ai ) , ϑi : −ai ≤ ϑi < −ai + ;
q
ij (j) 2ai (j) 4ai
I2 (ai ) , ϑi : −ai + ≤ ϑi < −ai + ;
q q
..
.
ij (j) 2ai (j)
Iq (ai ) , ϑi : ai − ≤ ϑi ≤ ai .
q
(j)
Here, ϑi is the jth element of the vector ϑi .
For each Bai , the center of the hyperrectangle Ii1i (ai ) × Ii2i (ai ) × · · · × Iini (ai )
s1 s2 sn
can be determined by
T
ηai i (si1 , si2 , . . . , sin ) , υ1i υ2i · · · υni
In order to accomplish the control task for the MAS (5.1) under the digital
transmission mechanism, we present the following design scheme of the
CDCP: Coder for Agent i : For ξˆi (dh) − ξ¯i (dh) ∈ Ii1i (ai (dh)) × Ii2i (ai (dh)) ×
s1 s2
· · · × Iini (ai (dh)) ⊂ Bai (dh) , one obtains
sn
ξ̄i (0) = 0
ξ̄i (k) = ξ̆i (k), k 6 = dh
(5.30)
ξ̄i (dh) = Aξ̆i (dh − 1) + Bŭi (dh − 1)
ŭi (dh − 1) = Kξ̆ (dh − 1)
98 Data-Rate-Constrained State Estimation and Control
Remark 5.1: Two auxiliary systems (5.30) and (5.31) are constructed in the design
of the coding-decoding protocol. The auxiliary system (5.30) generates a “prediction”
ξ̄i (dh) of the decoded state ξ̌i (dh) as the decoded state ξ̌i (dh) cannot be obtained at the
coding instant dh. On the other hand, it follows from (5.31) and (5.32) that ξ̆i (k) ≡
ξ̌i (k) for ∀k ≥ 0, and hence the auxiliary system (5.31) can be seen as a “copy” of
the system (5.32). Different from the procedure in [190] where the decoded state is
required to feed back to the coder side, in this chapter, such a requirement is removed
due to the introduction of an additional auxiliary system (5.31), which is closer to
the engineering practice.
Denoting ξ̄ (k) , colM {ξ̄i (k)} and ξ̆ (k) , colM {ξ̆i (k)}, we reformulate the
coder-decoder procedure in a compact form as follows:
Coder : For ξ̂ (dh) − ξ̄ (dh) ∈ I111 (a(dh)) × · · · × I11n (a(dh)) × I212 (a(dh)) × · · · ×
s1 sn s1
I22n (a(dh)) × · · · × IM1 Mn
M (a(dh)) × · · · × I M (a(dh)) ⊂ Ba(dh) , we have
sn s1 sn
where Ba(dh) = {ϑ(dh) ∈ RMn : |ϑ (j) (dh)| ≤ a(dh), j = 1, . . . , Mn} with a(dh) =
max1≤i≤M {ai (dh)} and ξ̄ (dh) = colM {ξ̄i (dh} is constructed as
ξ̄ (0) = 0
ξ̄ (k) = ξ̆ (k), k 6 = dh
(5.34)
ξ¯ (dh) = (IM ⊗ A)ξ̆ (dh − 1) − (LG ⊗ B)ŭ(dh − 1)
ŭ(dh − 1) = (IM ⊗ K)ξ̆ (dh − 1)
Observer-Based Consensus Control 99
Decoder :
ξˇ (0) = 0
ξ̌ (k + 1) = (IM ⊗ A)ξ̌ (k) − (L ⊗ B)u(k), k 6= dh − 1
G
1
(5.36)
ξ̌ (dh) = ξ̄ (dh) + ηa(dh) (s , . . . , sM )
1 n
u(k) = (IM ⊗ K)ξ̌ (k).
The following lemma is to verify that the CDCP proposed in this chapter
is well defined. In other words, we would like to deal with the decoding
condition ξ̂ (dh) − ξ̄ (dh) ∈ Ba(dh) for all d = 1, 2, . . ..
Proof: The mathematical induction method is utilized in this proof. First, for d = 1,
it follows from Lemma 5.3, Lemma 5.4 and the property of vector norm that
or, equivalently,
|ξ̂ (dh) − ξ̄ (dh)|∞ ≤ a(h). (5.40)
Second, with the assumption that |ξ̂ (jh) − ξ̄ (jh)|∞ ≤ a(jh) for j = 2, . . . , d, one has
|ξ(dh) − ξ̌ (dh)|
Therefore, in combination with (5.41) and (5.42), we can draw the conclusion that
√
Mn
|ξ̂ ((d + 1)h) − ξ̄ ((d + 1)h)| ≤ c1d s˜0 (c1 + ch0 ) + ch0 a(dh). (5.43)
q
Finally, it follows readily from (5.39)–(5.44) that the requirement in Lemma 5.5 is
satisfied for d ≥ 1, which completes the proof of this lemma.
Theorem 5.1: The discrete-time system (5.11) is detectable with a CDCP (5.33)–
(5.36) if the following inequality
√
Mn
ch0 <1 (5.45)
q
holds subject to (5.21) and (5.24) for a certain proper positive integer q, where
the parameters c0 and h have been defined in Lemma 5.3 and Lemma 5.4,
respectively.
Observer-Based Consensus Control 101
Proof: According to the definition of a(dh) in (5.37) and 0 < c1 < 1, it is easy to see
that
and then one can easily infer from (5.42) and (5.46) that
Moreover, for those non-coding instants k ∈ (dh, (d+1)h), it is noticed that ξ(k) and
ξ̌ (k) are actually the trajectories of (5.11) and, therefore, it follows immediately from
Lemma 5.3 that |ξ(k) − ξ̌ (k)|2 ≤ c0k−dh |ξ(dh) − ξ̌ (dh)|2 . So, we have that |ξ(k) −
ξ̌ (k)| is bounded at the non-coding instants, which implies that the dynamical system
(5.11) is detectable, namely, limk→∞ |ξ(k) − ξ̌ (k)| = 0. The proof is now complete.
Definition 5.3: The system (5.47) is said to be input-to-state stable, if there exist a
KL function β(·, ·) and a K class function γ ( · ) such that the dynamics of the system
state ς(k) satisfies
Lemma 5.6: ([58]). The nonlinear discrete-time system (5.47) is said to be input-to-
state stable if there exist a positive definite function V(k, ς(k)) : [0, +∞) × Rn 7 → R
(called an ISS-Lyapunov function), three K∞ class functions α1 (·), α2 (·) and α3 (·),
and a K class function ̟ ( · ) such that the following two inequalities
and
hold for all ς(k) ∈ Rn and u(k) ∈ Rp . Furthermore, if the above two inequalities are
met simultaneously, the functions β(·, ·) and γ (·) in Definition 5.3 can be selected as
β(·, k) = α1−1 (φ k α2 (·)) (0 < φ < 1) and γ (·) = α1−1 (α2 (α3−1 (̟ (·)))), respectively,
where α1−1 ( · ) expresses the inverse function of the monotone function α1 ( · ) and so
does α3−1 ( · ).
Subsequently, recalling the special form of (5.17b), we decouple it into the
following r − 1 parts
where [W]j ∈ RMj ×M stands for a matrix whose elements come from the 1st
Pj
row to the M2 th row of matrix W for j = 1, and from the ( s=2 Ms + 1)th
Pj+1
row to the ( s=2 Ms )th row of matrix W for j ≥ 2.
As discussed in [182], from the properties of the Jordan form (5.16), the
asymptotic property of system (5.51) is dominated by the diagonal terms,
and therefore, the consensus issue of system (5.1) can be now converted into
the problem of asymptotic stability of the following closed-loop system
It is not difficult to see that the systems (5.51) are asymptotically stable as
long as the systems (5.53) are asymptotically stable, which indicates from
the Lemma 5.2 that the asymptotic consensus can be reached in MASs (5.1).
Before providing the main results, we define
Theorem 5.2: Suppose that the network topology G contains a directed spanning
tree. Let the positive scalars ̺1 , ̺2 and ̺3 be given. The asymptotic consensus of
system (5.1) can be reached with the CDCP (5.29)-(5.32) if there exist a matrix K
and a positive matrix Q satisfying
5̄1 , AT QBK + (BK)T QA
− (a2 + ar )(BK)T Q(BK) > 0
(5.54a)
T
5̄2 , (1 + σ1 )(A − a2 BK) Q(A − a2 BK)
+ (1 + σ2 )b2m (BK)T Q(BK) − Q < 0
(5.54b)
+ ξE T (k)(WiR T R E
−1 ⊗ BK) Q(Wi−1 ⊗ BK)ξ (k)
r n
X
V(k + 1) − V(k) ≤ (θiR (k))T (1 + σ1 )(A − ai BK)T Q(A − ai BK)
i=2
+ (1 + σ2 )bi2 (BK)T Q(BK) − Q θiR (k)
+ (θiI (k))T (1 + σ1 )(A − ai BK)T Q(A − ai BK)
o
+ (1 + σ2 )b2i (BK)T Q(BK) − Q θiI (k) + ξE T (k)ŴξE (k)
Then, combining (5.54b) and (5.55), one has 5̄i ≤ 5̄2 < 0. Consequently, in
accordance with the definition of θ (k), we further derive that
r n
X o
V(k + 1) − V(k) ≤ (θiR (k))T 5̄2 θiR (k) + (θiI (k))T 5̄2 θiI (k)
i=2
+ ξE T (k)ŴξE (k)
r n
X o
≤ −λmin {−5̄2 } (θiR (k))T θiR (k) + (θiI (k))T θiI (k)
i=2
+ ξ (k)ŴξE (k)
ET
Noting that V(k) can also be rewritten as V(k) = θ T (k)Q θ(k), we choose
α1 |θ (k)| = λmin {Q }|θ (k)|2 ,
α2 |θ (k)| = λmax {Q }|θ (k)|2 ,
α3 |θ (k)| = λmin {−5̄2 }|θ(k)|2 ,
̟ (|ξE (k)|) = λmax {Ŵ}|ξE (k)|2 .
Remark 5.2: Both the ISS theory and the algebraic graph method are utilized to
derive the consensus conditions in this chapter. First, according to analysis results
in Theorem 1, the decoding error ξE (k) can be regarded as the exogenous disturbance
inputs which are bounded and asymptotically converge to zero, and hence the ISS
theory can be directly used to analyze the coder-decoder-based consensus problem.
In addition, the eigenvalue information (including both the real part and imaginary
part) of the Laplacian matrix is reflected in the consensus conditions, which shows
that the communication topology serving as an important factor has a non-negligible
impact on the consensus of the MASs.
Theorem 5.3: Suppose that the network G contains a directed spanning tree. Let
the positive scalars ̺1 , ̺2 and ̺3 be given. The asymptotic consensus in system
106 Data-Rate-Constrained State Estimation and Control
(5.1) can be reached with the CDCP (5.29)–(5.32) if there exist a positive matrix Q,
a nonsingular matrix S and a matrix K satisfying
−˜a−2 AT QA (ã−1 SUA − ãK̃)T
<0 (5.57a)
∗ Q − (SU)T − SU
˜T
−Q σ˜ 1 (SUA − a2 K˜ )T σ˜ 2 bm K
∗
Q − (SU)T − SU 0
∗ ∗ Q − (SU)T − SU
<0 (5.57b)
−1
K = S11 K. (5.58)
By applying the Schur Complement Lemma, one can conclude that (5.54a) is true if
and only if the following inequality
−ã−2 AT QA (ã−1 A − aBK
˜ )T
<0 (5.60)
∗ −Q−1
holds.
On the other hand, it is worth mentioning that −Q−1 ≤ (SU)−1 Q(SU)−T −
(SU)−T − (SU)−1 , which means that (5.60) can be guaranteed by
−ã−2 AT QA (ã−1 A − aBK
˜ )T
<0 (5.61)
∗ −WT QW − W − WT
Observer-Based Consensus Control 107
where W = (SU)−T . Then, pre- and post-multiplying (5.61) by diag{I, W−T } and
its transpose leads to
−2 T
−ã A QA (ã−1 SUA − a˜ SUBK)T
< 0. (5.62)
∗ Q − (SU)T − SU
By noticing (5.58), we have SUBK = K̃, which implies that (5.54a) can be guaranteed
by (5.57a). Similarly, (5.54b) can also be guaranteed by (5.57b), and therefore the
proof of this theorem is complete.
In this example, we assume that there are five agents communicating with
each other via a directed topology G with the adjacency matrix A = [aij ]5×5 ,
where a13 = a15 = a21 = a24 = a34 = a35 = a41 = a45 = a51 = a53 = 1 and
other elements are 0.
The eigenvalues of the associated Laplacian matrix LG are, respectively,
calculated as 0, 2, 2.5 + 0.866j, 2.5 − 0.866j and 3, where “j” stands for the
imaginary unit.
For each agent, the initial state is set as xi0 = [0.6 − 0.1i 0.8 + 0.3i]T ,
i = 1, 2, . . . , 5. Choose ǫ = 1.1, µ = 0.3, h = 3 and q = 15. Then, solving matrix
inequality (5.21), (5.24), (5.57a) and (5.57b) by the Matlab software, we have
c0 = 1.3247 and c1 = 0.5556. Moreover, the desired observer and controller
gain matrices are obtained as L = [1.3030 0.5608]T and K = [1.5918 0.1592],
respectively.
The simulation results are shown in Figures 5.1–5.3. Figure 5.1 depicts the
sate trajectories of each agent for the MAS (5.1) with the designed control
scheme and the sate trajectories of each agent without the control input
are plotted in Figure 5.2. In addition, in order to show the applicability
of the coding-decoding-based communication protocol, Figure 5.3 displays
the corresponding decoding error for each agent. It is inferred from
the three figures that the closed-loop MAS (5.1) can attain the desired
consensus performance while the open-loop one cannot. The simulation
results have demonstrated that the developed consensus control scheme
performs very well.
108 Data-Rate-Constrained State Estimation and Control
1.5
0.5
0
0 10 20 30 40 50
0.5
−0.5
−1
0 10 20 30 40 50
FIGURE 5.1
State trajectories xij (k) (i = 1, 2 . . . , 5; j = 1, 2) with control input.
1
x
0.5
x
0 x
x
−0.5
x
−1
0 10 20 30 40 50
2
x
1
x
0 x
x
−1
x
−2
0 10 20 30 40 50
FIGURE 5.2
State trajectories xij (k) (i = 1, 2 . . . , 5; j = 1, 2) without control input.
Observer-Based Consensus Control 109
1.5
0.5
0
0 10 20 30 40 50
0.5
−0.5
−1
0 10 20 30 40 50
FIGURE 5.3
The decoding errors ξEij (k) (i = 1, 2 . . . , 5; j = 1, 2).
5.4 Summary
In this chapter, the observer-based consensus control problem has been
dealt with for a class of discrete-time networked MASs with CDCP. The
signal transmission of each agent between the observer and the controller
has been implemented via the digital communication channel. By means
of the uniform quantization technique, the CDCP has been employed to
encode the relative measurements between adjacent agents to finite symbolic
values before transmission and then decode the received symbolic data at
the controller side. In virtue of the decoded signal, an observer-based control
scheme has been put forward. Then, consensus criteria have been derived in
terms of the solutions to certain matrix inequality constraints such that the
closed-loop system achieves the desired performance requirement.
6
Recursive Filtering with Measurement
Fading: A Multiple Description Coding
Scheme
where xk ∈ Rnx represents the state vector, ζk ∈ Rnu is the system input, and
ỹk ∈ Rny denotes the measurement output. h(·, ·) : Rnx × Rnζ 7→ Rnx is
a deterministic and continuously differential nonlinear function. ωk ∈ Rnω
and νk ∈ Rnν are two families of mutually independent truncated Gaussian
white noise sequences taking values over the interval [−ω̄, ω̄] and [−ν̄, ν̄],
respectively, where ω̄ and ν̄ are given positive scalars. The probability
density functions of the truncated Gaussian white sequences ωk and νk are,
respectively, defined as
√1 φ ω√ k −µω
p R0k R0k
fω (ωk ; µω , R0k , −ω̄, ω̄) ,
¯ −µω
8 ω√ − 8 −√ ω̄−µω
R0k R0k
and
√1 φ νk −µν
√
p Q0k Q0k
fν (νk ; µν , Q0k , −ν̄, ν̄ ) ,
ν̄−µν −
√ν¯−µν
8 √ −8
Q0k Q0k
Rx 2
where φ(x) , √1 exp ( − 21 x2 ), 8(x) , −∞ √1 exp ( − s2 )ds, µω and R0k
2π 2π
are, respectively, the mean and variance of ωk without truncation. Similarly,
µν and Q0k are, respectively, the mean and variance of νk without truncation.
Without loss of generality, letting µω = µν = 0, it is not difficult to calculate
that the truncated ωk and νk are zero-mean random sequences with the
variances
−ω̄ ω̄
ω̄ φ √ +φ √
R0k R0k
Rk = R0k 1 −
√
R0k 8 √−ω̄ − 8 √ω̄
R0k R0k
and
ν̄ φ √−ν¯ + φ √ν¯
Q0k Q0k
1 −
Qk = Q0k p
,
Q0k 8 √−ν̄ − 8 √ν¯
Q0k Q0k
respectively.
M
X
yk = αmk y˜ k−m + B3k ̟k (6.2)
m=0
where M stands for the given number of the paths where the signals
get through. αmk (m = 0, 1, . . . , M) are the channel coefficients which are
mutually independent random variables in m and k. In addition, αmk
have the probability density functions pm (αmk ) on the interval [0, 1]
with mathematical expectations ᾱm and variances ςm . ̟k ∈ Rn̟ is a zero-
mean Gaussian random vector that characterizes the channel noise with
variance Sk . All the noise signals and random variables αmk (m = 0, 1, . . . , M)
are mutually uncorrelated. B3k is a known time-varying matrix with
appropriate dimension.
To facilitate the description, we set Mk , min{M, k} and rewrite the model
(6.2) as follows:
Mk
X
yk = αmk ỹk−m + B3k ̟k . (6.3)
m=0
FIGURE 6.1
Structure of two-description coding-decoding for NSs with unreliable channels.
114 Data-Rate-Constrained State Estimation and Control
fading measurement is first encoded into two descriptions, which are then
simultaneously transmitted to the decoders via two mutually independent
channels.
According to Figure 6.1, the general form of the MDC is mathematically
characterized as follows:
Encoder:
(
ulk = f1l (ylk )
(6.4)
vlk = f2l (ylk )
Decoder:
for l = 1, . . . , ny , where f1l ( · ) and f2l ( · ) are two coding functions whose
outputs ulk and vlk can be regarded as the individual descriptions of the
source ylk with ylk being the lth component of yk . ȳlk is the decoding value
corresponding to ylk . g1l ( · ) and g2l ( · ) are two side decoding functions and
gcl (·, ·) is the central decoding function. λik (i = 1, 2) are two independent
random variables which govern the packet dropout phenomena during the
transmissions of the descriptions and satisfy the Bernoulli binary distribution
taking values on either 1 or 0 with mathematical expectations λ̄i and
variances σi , respectively. Here, λki = 1 indicates that the ith channel works
well, and λki = 0 means that the ith channel suffers from the packet dropouts
at time instant k.
For notational convenience, we denote
where xˆ k|k ∈ Rnx is the estimate of the system state xk at time instant k, x̂k+1|k ∈
Rnx is the one-step prediction of xk+1 at k, Kk+1 ∈ Rnx ×ny is the time-varying
filter parameter to be designed, and ϑ( · ) : Rny 7→ Rny is the innovation
function of yk+1 whose explicit expression is to be given later.
The objective of this chapter is twofold.
Index Generation
First, we define the scalar uniform quantizer q( · ) with the following
structure:
L, τk ≥ L
q(τ ) = −L, τk < −L (6.9)
−L + (2s−1)L , −L + υ ≤ τ < −L + υ
ρ 1 2
µlk L
|̺lk | ≤ . (6.10)
ρ
Recursive Filtering with Measurement Fading 117
FIGURE 6.2
Nested index assignment for d = 8 and p = 1 in [156].
Remark 6.1: It is observed from (6.10) that a larger µlk leads to a larger
quantization error, which means that the scaling parameter µlk should be chosen as
small as possible for the sake of decreasing the quantization error. On the other hand,
µlk needs to be large enough to avoid the quantizer saturation. As such, µlk should
be selected appropriately to balance the trade-off between the quantization error and
the quantizer saturation.
Next, for the lth quantized measurement component ql (ylk ), we define the
index generator function ψl ( · ) : R → N+ satisfying
Remark 6.2: It is apparent from (6.10) that the quantization level ρ has a significant
impact on the quantization accuracy. That is, a large quantization level ρ results in
a high quantization accuracy (or small quantization error) while occupying a large
amount of bandwidth. It is noted that a real network channel is often subjected to
the bandwidth constraint. Here, it is assumed that only χ-bits of data are allowed
118 Data-Rate-Constrained State Estimation and Control
to be transmitted at each time instant. In this case, for the traditional uniform-
quantization-based single description coding approach, the quantization level is
determined by ρ = 2χ . However, it is seen from Figure 6.2 that the proposed
two-description-based coding approach enlarges the quantization level from 2χ to
3 × 2χ − 2, thereby improving the quantization accuracy.
(r + 1, rlk + 1), if mlk =1
lk
(rlk + 1, rlk ), if mlk = 0 and rlk is even
(rlk , rlk + 1), if mlk = 0 and rlk is odd (6.12)
lk + 2, rlk + 1), if mlk = 2 and rlk is even
(r
(rlk + 1, rlk + 2), if mlk = 2 and rlk is odd
where ϕ1l (ilk ) and ϕ2l (ilk ) are, respectively, the row assignment function and
column assignment function; rlk = ⌊ 2pilk+1 ⌋ = ⌊ i3lk ⌋ and mlk = h 2p+1
ilk
i = h i3lk i.
It is easy to see that the index assignment function ϕl (ilk ) maps the single
description ilk into the corresponding description pair (ulk , vlk ), where ulk =
ϕ1l (ilk ) and vlk = ϕ2l (ilk ).
Based on the above discussion, the coding functions f1l ( · ) and f2l ( · ) in (6.4)
can be finally expressed as
(
f1l (ylk ) = ϕ1l (ψl (ql (ylk )))
(6.13)
f2l (ylk ) = ϕ2l (ψl (ql (ylk ))).
• Case 1: both the descriptions ulk and vlk are successfully received at
the decoder side. Then, the central decoder is applied to uniquely
determine the index ilk and obtain the decoded measurement
component ȳlk .
• Case 2: one of the descriptions (ulk or vlk ) is lost during the packet
transmissions. The explicit location of the index ilk is unknown and
only its row number (or column number) can be acquired. Hence, in
order to generate the decoded measurement ȳlk by the side decoder,
we let the diagonal element in the same row (or column) with ilk be
an estimation of ilk .
• Case 3: neither of the description packets is available to the decoders.
In this case, îlk is set as zero and the latest decoded measurement
ȳl(k−1) is utilized to compensate the value of ȳlk by using the ZOH
strategy.
Based on the above analysis, the key point in the design of the decoding
procedure is to determine the estimated index value îlk for each measurement
component ylk . Obviously, with more descriptions received, we would
expect a less error between îlk and ilk , and hence a more accurate decoded
value ȳlk . As such, corresponding to the above three cases, we need to
examine the relationships between the received description(s) and the
estimated index îlk .
Let us start with the analysis for Case 1. In this case, it follows directly from
(6.12) that îlk , φcl (ulk , vlk ) =
3ulk − 2,
if ulk = vlk
3ulk − 3, if ulk = vlk + 1 and ulk is odd
3ulk , if ulk = vlk − 1 and ulk is odd (6.14)
3ulk − 4, if ulk = vlk + 1 and ulk is even
3ulk − 1, if ulk = vlk − 1 and ulk is even
where φcl (·, ·) is the estimation function of the central decoder. Furthermore,
(6.14) means that the estimated index îlk can be explicitly calculated and the
index estimation error is ĩlk = îlk − ilk = 0.
For Case 2, suppose that only the description ulk (the row number) is
received while the description vlk (the column number) is lost. In such a case,
120 Data-Rate-Constrained State Estimation and Control
we let the index, which is located in the diagonal cell of the ulk th row, be the
estimation of ilk . So, we have
Theorem 6.1: Under the framework of the multiple description coding scheme
(6.4)–(6.5), for each measurement component ylk (l = 1, 2, . . . , ny ), the
corresponding decoding error 1lk , ȳlk − ylk satisfies
(
1slk , |1slk | ≤ 5̺lk for the side decoder
1lk = c c (6.17)
1lk , |1lk | ≤ ̺lk for the central decoder
Proof: First, recalling that ilk can be calculated as ilk = 3rlk + mlk , we confirm from
(6.12), (6.15)–(6.16) that the index estimation error satisfies
(
0, both descriptions are received
|ĩlk | ≤ (6.18)
2, only one description is received.
Then, based on the obtained index estimation îlk , we define the following inverse
quantization function q̂l ( · ) as follows:
(2îlk − 1)L
qˆ l (iˆlk ) , −L + (6.19)
ρ
Then, it follows directly from (6.20) that the decoding error 1lk of ylk satisfies (6.17),
and the proof of this theorem is complete.
s s · · · 1ns y k ]T
1sk , [11k 12k
c c · · · 1cny k ]T
1ck , [11k 12k (6.21)
βik , δ(λ̃k , i), λ̃k , λ1k + λ2k .
Based on the results in Theorem 6.1, the decoded measurement output ȳk
is described with the following form:
ȳk = β0k ȳk−1 + β1k (yk + 1ks ) + β2k (yk + 1ck ) (6.22)
qP qP
ny 2 and κ c = ny 2
where |1sk | ≤ κks and |1kc | ≤ κkc with κks = l=1 (5̺ lk ) k l=1 ̺lk .
P2
In addition, it is derived from the definition of βik that i=0 βik = 1 and
Remark 6.3: It follows from (6.17) and (6.21) that the decoding error can be
expressed as 1k , δ(λ̃k , 0)|1kd | + δ(λ̃k , 1)|1ks | + δ(λ˜ k , 2)|1kc |, where 1ks and
122 Data-Rate-Constrained State Estimation and Control
qP
ny 2
1ck , which have been defined in (6.21), satisfy |1sk | ≤ κks , l=1 (5̺lk ) and
qP
ny 2
|1kc | ≤ κkc , d
l=1 ̺lk , respectively. |1k | denotes the decoding error when both of
the descriptions are missing, and therefore it is reasonable to assume that its upper
bound is greater than κks . Then, in terms of the condition κks = 5κkc , there exists a
positive scalar p > 5 such that |1dk | ≤ pκkc . Next, introducing an average decoding
error which is defined as 1̄k , E{1k }, one calculates 1̄k = E{δ(λ̃k , 0)}|1kd | +
E{δ(λ̃k , 1)}|1sk | + E{δ(λ̃k , 2)}|1ck | = β̄0 |1dk | + β̄1 |1sk |+β̄2 |1kc | ≤ β̄0 pκkc + β̄1 κks +
β̄2 κkc = (pβ̄0 + 5β¯ 1 + β̄2 )κkc , ℵ(λ¯ 1 , λ̄2 , κkc ), where β¯ 0 = (1 − λ̄1 )(1 − λ̄2 ),
β̄1 = λ̄1 (1 − λ̄2 ) + λ̄2 (1 − λ̄1 ) and β̄2 = λ̄1 λ̄2 . It is not difficult to derive that
ℵ(λ̄1 , λ̄2 , κkc ) is monotonically decreasing with respect to λ¯ i (i = 1, 2). Therefore, one
can conclude that a larger packet dropout rate (i.e. a smaller λ̄i (i = 1, 2)) would lead
to a larger upper bound of the average decoding error, which complies with practical
engineering.
M
X
ϑ(ȳk+1 ) , ȳk+1 − β̄0 ȳk − (1 − β̄0 ) ᾱm Ck−m+1 x̂k−m+1|k−m . (6.25)
m=0
∂h(xk ,ζk )
where Ak = ∂xk and o(|˜xk|k |) means the linearization error caused
xk =x̂k|k
by discarding the high-order terms. As discussed in [174], such a linearization
error is further transformed into the following tractable form:
Denoting γm,k , (1 − β0k )αm,k , γ̄m , E{γm,k } = (1 − β̄0 )α¯ m , β̃i,k , βi,k − β̄i and
γ̃m,k , γm,k − γ̄m , we calculate the innovation of the filter as follows:
M
X
ϑ(ȳk+1 ) = ȳk+1 − β̄0 ȳk − (1 − β̄0 ) ᾱm Ck−m+1 x̂k−m+1|k−m
m=0
M
X
= β0,k+1 ȳk + (1 − β0,k+1 ) αm,k+1 ỹk−m+1
m=0
s c
+ (1 − β0,k+1 )B3,k+1 ̟k+1 + β1,k+1 1k+1 + β2,k+1 1k+1
M
X
− β̄0 ȳk − (1 − β̄0 ) ᾱm Ck−m+1 x̂k−m+1|k−m (6.31)
m=0
M
X M
X
= β̃0,k+1 ȳk + γ̃m,k+1 Ck−m+1 xk−m+1 + γm,k+1
m=0 m=0
M
X
× B2,k−m+1 νk−m+1 + γ̄m Ck−m+1 x̃k−m+1|k−m
m=0
Hence, it follows from (6.1), (6.7b) and (6.31) that the filtering error dynamics
is governed by
124 Data-Rate-Constrained State Estimation and Control
M
X
x̃k+1|k+1 = (I − γ̄0 Kk+1 Ck+1 )x̃k+1|k − Kk+1 γ̄m Ck−m+1 x̃k−m+1|k−m
m=1
M
X M
X
− Kk+1 γ̃m,k+1 Ck−m+1 xk−m+1 − γm,k+1 Kk+1 B2,k−m+1 νk−m+1
m=0 m=0
− β̃0,k+1 Kk+1 ȳk − (1 − β0,k+1 )Kk+1 B3,k+1 ̟k+1
s c
− β1,k+1 Kk+1 1k+1 − β2,k+1 Kk+1 1k+1 . (6.32)
Lemma 6.1: Assume that A, M, N and F are real matrices of compatible dimensions
with FFT ≤ I. For any positive scalar π > 0, if there exists a positive definite matrix
X > 0 such that π −1 I − NXNT > 0, then the following inequality is true:
Lemma 6.2: For the positive definite matrix X > 0, real matrix functions Uk (X) =
UkT (X) ∈ Rn×n and Vk (X) = VkT (X) ∈ Rn×n , if
and
Uk (Y) ≤ Vk (Y) (6.35)
over the time horizon [0 N], then the solutions to the following difference equations:
satisfy
Sk ≤ Tk . (6.37)
The proof of the following lemma is easily accessible from (6.32) and is
therefore omitted.
where
M
!
X
Fk = Kk+1 γ̄m Ck−m+1 x̃k−m+1|k−m
m=1
M
!
X
Gk+1 = Kk+1 γ̃m,k+1 Ck−m+1 xk−m+1
m=0
!T
XM
Lk+1 = (I − γ̄0 Kk+1 Ck+1 )E x̃k+1|k γ̄m Ck−m+1 x̃k−m+1|k−m KT
k+1
m=1
sT T
Mk+1 = β̄1 (I − γ¯0 Kk+1 Ck+1 )E x̃k+1|k 1k+1 Kk+1
Nk+1 = β̄2 (I − γ̄0 Kk+1 Ck+1 )E x̃k+1|k 1cT T
k+1 Kk+1
( M !)
X
Ok+1 = β̄1 Kk+1 E γ̄m Ck−m+1 x̃k−m+1|k−m DeltasT T
k+1 Kk+1
m=1
( M
!)
X
cT T
Pk+1 = β̄2 Kk+1 E γ̄m Ck−m+1 x̃k−m+1|k−m 1k+1 Kk+1
m=1
( M
)
X
Qk+1 = Kk+1 E β˜ 0,k+1 γ˜m,k+1 Ck−m+1 xk−m+1 ȳkT Kk+1
T
m=0
( M
)
X
sT T
Rk+1 = Kk+1 E β1,k+1 γ̃m,k+1 Ck−m+1 xk−m+1 1k+1 Kk+1
m=0
( M
)
X
Sk+1 = Kk+1 E β2,k+1 γ̃m,k+1 Ck−m+1 xk−m+1 1kcT+1 Kk+1
T
m=0
n o
Tk+1 = Kk+1 ȳk E β̃0,k+1 β1,k+1 1sT T
k+1 Kk+1
n o
Uk+1 = Kk+1 ȳk E β̃0,k+1 β2,k+1 1cT T
k+1 Kk+1
On the basis of Lemmas 6.1–6.3, we shall now handle the design issue of
the filter parameter Kk . Due to uncertainty terms (e.g. Fk , 1sk and 1ck ) in the
filtering error variance matrix Pk|k , an upper bound of Pk|k is first determined,
and then the filter parameter Kk is calculated by minimizing the derived
upper bound at each sampling instant k.
Theorem 6.2: Consider the prediction error variance (6.30) and the filtering error
variance (6.38). Let the positive scalars ǫi , εh̄i (h¯ = l, o, p, q, r, s and i = 1, 2, . . . , M)
and εj (j = m, n, t, u) be given. Assume that the following discrete-time coupled
algebraic Riccati-like difference equations:
and
M
X
+ ξ2m Kk+1 Ck−m+1 5k−m+1|k−m CTk−m+1 Kk+1
T
m=1
M
!
X
+ Kk+1 ξ3 θk2 I + ξ4 ȳk ȳTk + T
γ̄m B2,k−m+1 + (1 − β̄0 )B3,k+1 Kk+1
m=0
M
X
+ ξ5m Kk+1 Ck−m+1 X̂k−m+1|k−m CkT−m+1 KkT+1 (6.40)
m=1
subject to
(
5i|i = Pi|i > 0; i = −M, −M + 1, . . . , 0 (6.41a)
−1
π I − Nk 5k|k NkT >0 (6.41b)
have the positive definite solutions 5k+1|k and 5k+1|k+1 . Then, the desired filter
parameter Kk+1 is determined by
M
X
+ ξ2m Ck−m+1 5k−m+1|k−m CTk−m+1 + ξ3 θk2 I
m=1
Recursive Filtering with Measurement Fading 127
M
X
+ ξ4 ȳk ȳTk + B2,k−m+1 + (1 − β̄0 )B3,k+1
m=0
M
!−1
X
+ ξ5m Ck−m+1 X̂k−m+1|k−m CTk−m+1 (6.42)
m=0
where
(1) (2)
ξ1 = 1 + ε̄l + εm + εn , ξ2m = ξ2m + ξ2m
(1) (2)
ξ3 = 25ξ3 + ξ3 , σγmn = E{γ˜m,k γ˜n,k }
ξ4 = β̄0 (ε̄q β̄0 + εt−1 β¯ 0 + εu−1 β̄0 + 1 − β̄0 )
)ℑm , ξ¯1 = ξ1 γ¯02 + ξ20
−1 (2)
ξ5m = (1 + ǫm
(1) −1 2 −1 2 −1 2
ξ2m = εlm γ¯m + εom γ̄m + εpm γ̄m + γ̄ γ¯m
= β̄12 (εm
−1
+ ε¯ o + ε¯ r + εt + β¯ 1−1 )
(1)
ξ3
= β̄22 (εn−1 + ε̄p + ε̄s + εu + β̄2−1 )
(2)
ξ3
−1 2 −1 ¯ 2 2
ℑm = εqm γ̄m + ε̄rm β0 α¯ m + ε¯ s−m1 β¯ 02 α¯ m
2
+ σγm
M
X
(2)
ξ2m = (1 + ǫm )ℑm , γ̄ = γ¯m
m=1
X̂k−m+1|k−m = x̂k−m+1|k−m x̂Tk−m+1|k−m
M
X
ε̄h̄ = εh¯ m , h¯ = l, o, p, q, r, s
m=1
1
ny 2 M
2 L
X X
θk = µlk , σγm = σγmn
ρ
l=1 n=0
V1k ( · ) : Rnx ×nx → Rnx ×nx and V2k ( · ) : Rnx ×nx → Rnx ×nx stand for two matrix-
valued functions. In addition, the matrix 5k+1|k+1 is an upper bound of Pk+1|k+1 ,
namely, Pk+1|k+1 ≤ 5k+1|k+1 . Also, such an upper bound is minimized by the filter
parameter Kk+1 at each sampling instant.
Proof: The proof is carried out by applying the mathematical induction. First,
according to (6.30), the prediction error variance Pk+1|k is actually a function
of the filtering error variance Pk|k , namely, Pk+1|k , U1k (Pk|k ), and then one
easily obtains that U1k (Xk ) ≤ U1k (Yk ), ∀ 0 ≤ Xk ≤ Yk . Noting that Pi|i = 5i|i
(i = −M, −M + 1, . . . , 0) and assuming that Pi|i ≤ 5i|i (i = 1, 2, . . . , k), we have
128 Data-Rate-Constrained State Estimation and Control
U1k (Pk|k ) ≤ U1k (5k|k ). Subsequently, it is readily observed from Lemma 6.1, (6.30),
(6.39) and (6.41b) that Pk+1|k = U1k (Pk|k ) ≤ U1k (5k|k ) ≤ V1k (5k|k ) = 5k+1|k . In
the following, we only need to show that Pk+1|k+1 ≤ 5k+1|k+1 . For this purpose, let
us deal with some terms of the right-hand side of (6.38).
1 1 1 1
By resorting to the elementary inequality (ε 2 x − ε− 2 y)(ε 2 x − ε− 2 y)T ≥ 0 for
any x, y ∈ Rn and ε > 0, one has
m=1
+ ε̄p β̄22 Kk+1 1ck+1 1cT T
k+1 Kk+1 (6.47)
M
X
−1 2
QkT+1 + Qk+1 ≤ εqm γ¯m Kk+1 Ck−m+1 E{xk−m+1 xTk−m+1 }CTk−m+1 Kk+1
T
m=0
+ ε̄q β̄02 Kk+1 ȳk ȳTk KkT+1 (6.48)
M
X
T −1 ¯ 2 2
Rk+1 + Rk+1 ≤ εrm β0 α¯ m Kk+1 Ck−m+1 E{xk−m+1 xTk−m+1 }CTk−m+1 Kk+1
T
m=0
(6.49)
+ ε̄r β̄12 Kk+1 1k+1s
1sT T
k+1 Kk+1 (6.50)
XM
T −1 ¯ 2 2 T
Sk+ 1 + Sk+1 ≤ εsm β0 α¯ m Kk+1 Ck−m+1 E{xk−m+1 xk−m+1 }CTk−m+1 Kk+1
T
m=0
+ ε̄s β̄22 Kk+1 1k+1c
1cT T
k+1 Kk+1 (6.51)
T
Tk+1 + Tk+1 ≤ εt−1 β¯ 02 Kk+1 ȳk ȳkT Kk+1
T
+ εt β̄12 Kk+1 1sk+1 1sT T
k+1 Kk+1 (6.52)
Recursive Filtering with Measurement Fading 129
and
T
Uk+1 + Uk+1 ≤ εu−1 β̄02 Kk+1 ȳk ȳTk Kk+1
T
+ εu β̄22 Kk+1 1k+1
c
1cT T
k+1 Kk+1 . (6.53)
M
X
E{Fk FkT } ≤ γ̄ γ̄m Kk+1 Ck−m+1 Pk−m+1|k−m CTk−m+1 Kk+1
T
(6.54)
m=1
M
X
E{Gk GkT } ≤ σrm Kk+1 Ck−m+1 E{xk−m+1 xTk−m+1 }CTk−m+1 Kk+1
T
. (6.55)
m=0
where ǭ1m = 1 + ǫm and ǭ2m = 1 + ǫm −1 . On the other hand, based on (6.41a) and the
In the rest of the proof, it remains to show that the given filter parameter (6.42)
minimizes the variance upper bound 5k+1|k+1 at each sampling instant. Applying
the partial derivative operation to the trace of 5k+1|k+1 with respect to Kk+1 , we have
∂tr{5k+1|k+1 }
∂Kk+1
(2)
= −2ξ1 γ¯0 (I − γ¯0 Kk+1 Ck+1 )5k+1|k CTk+1 + 2ξ20 Kk+1 Ck+1 5k+1 CTk+1
M
X
T 2
+2 ξ2m Kk+1 Ck−m+1 5k−m+1|k−m Ck−m ¯ kT
+1 + 2Kk+1 ξ3 θk I + ξ4 ȳk y
m=1
(6.58)
M
!
X
+ γ̄m B2,k−m+1 + (1 − β̄0 )B3k
m=0
M
X
+2 ξ5m Kk+1 Ck−m+1 X̂k−m+1|k−m CTk−m+1 .
m=1
130 Data-Rate-Constrained State Estimation and Control
∂tr{5k+1|k+1 }
Setting ∂ Kk+1 = 0, the filter parameter Kk+1 is immediately obtained with
the form in (6.42), and the proof of this theorem is thus complete.
Remark 6.4: The computational burden is a crucial issue which should be taken
into account during the filtering algorithm design. For the considered system (1)
and (2), the dimensions of system parameters are given as follows: xk ∈ Rnx ,
yk ∈ Rny , B1k ∈ Rnx ×nω , B2k ∈ Rny ×nν , B3k ∈ Rny ×n̟ and Ck ∈ Rny ×nx . By
carrying out some matrix manipulations (e.g. addition, multiplication, transpose,
inversion, etc.), it is not difficult to calculate that the proposed filtering algorithm
mainly contains a nonlinear operation, (7M + 18) addition operations, (18M + 35)
multiplication operations, (7M + 12) transpose operations and (3M + 7) inversion
operations, respectively. Based on the well-known computation complexity of the
matrix manipulations, the total computational complexity of the proposed filtering
algorithm for each iteration is O = maxi=1,2...,6 {Oi }, where O1 = O(h(x̂k|k , ζk )),
O2 , O(9n2.376 x + 3n2x + nx nω (nx + nω )), O3 , Oa3 + Om3 + Ot3 + Oi3 , O4 ,
O((M+1)nx ny +(M+2)ny ), O5 , O((1+nx )ny ), and O6 = Oa6 + Om6 + Ot6 with
Oa3 = O((3M+5)ny2 ), Om3 = O(2(1+M)nx ny (nx +ny )+ny2 +(M+1)ny nν (ny +
nν )+ny n̟ (ny +n̟ )), Ot3 = O((3M+4)nx ny +ny ) and Oi3 = O((3M +5)ny2.376 )
and Oa6 = O((7 + 3M)nx2 ), Om6 = O((M + 3)nx2.376 + (6M + 5)nx2 ny + (M + 1)
(ny n2ν + n2y nν ) + ny n2̟ + n2y n̟ ), Ot6 = O(n2x + (4M + 3)ny nx ). It is noted that the
computational complexity increases polynomially with the growth of the dimensions
of system parameters. Fortunately, research on matrix computations is a quite active
field in applied mathematics and operations research community, and substantial
speedups can be expected in the near future.
Remark 6.5: The main results of this chapter are dependent on some parameters
such as ǫi , εhi
¯ (h¯ = l, o, p, q, r, s and i = 1, 2, . . . , M) and εj (j = m, n, t, u).
In fact, these parameters are involved in the upper bound of the filtering error
variance (i.e. 5k|k ). In general, a basic principle for selecting these parameters is
to minimize the obtained upper bound of the filtering error variance (i.e. 5k|k ) at
time instant k, that is, it is desirable to determine a set of parameters that would
(locally) minimize 5k|k in the sense of matrix trace. Unfortunately, the upper bound
of the filtering error variance (i.e. 5k|k ) is actually a non-convex function of these
parameters, and this makes it extremely difficult (if not impossible) to develop an
analytic algorithm for selecting the best parameters in order to achieve the local
minimum of the obtained upper bound. In this case, a rather practical way would
be to select these parameters for optimal performance by using the evolutionary
computation algorithms (e.g. particle swarm optimization algorithm and genetic
algorithm), and this would be one of the future research topics.
Remark 6.6: In this chapter, we make tremendous efforts to examine the impact
from the MDC scheme on the filtering performance for a class of stochastic nonlinear
systems subject to measurement fading. It can be seen from Theorem 6.2 that all
Recursive Filtering with Measurement Fading 131
the factors contributing to the system complexity are reflected in the filter design
procedure, which include: 1) the stochasticity and nonlinearity of the system; 2) the
channel coefficient of the measurement fading phenomenon; 3) the coding accuracy
of the proposed MDC scheme; and 4) the occurrence probabilities of the packet
dropout during the transmission of the individual descriptions. In comparison with
the existing literature, there are three distinct features with our main results: 1) this
is the first attempt to consider the recursive filtering issue for the nonlinear stochastic
system with the MDC scheme; 2) a concrete design procedure is, for the first time,
proposed in a mathematically rigorous way on the MDC scheme; and 3) the developed
filtering algorithm is of a recursive nature and is therefore suitable for the online
application.
FIGURE 6.3
The diagram of three-tank system.
132 Data-Rate-Constrained State Estimation and Control
flow rate Q1 (t) and Q2 (t). Also, two sensors are installed to measure their
level heights, respectively.
In the simulation, it is assumed that the levels of three tanks satisfy the
condition h1 (t) > h3 (t) > h2 (t), that is, water always flows from Tank 1 to
Tank 2 via Tank 3. In terms of the “mass balance principle”, the dynamical
behavior of the level heights of the tanks can be described with the following
differential equations:
1
˙
h1 (t) = Sa (Q1 (t) − Q13 (t)) + b11 ω1 (t)
1
ḣ2 (t) = Sa (Q2 (t) + Q32 (t) − Q20 (t)) + b12 ω2 (t) (6.59)
1
ḣ3 (t) = Sa (Q13 (t) − Q32 (t)) + b13 ω3 (t)
where Qij (t) stands for the water flow rate from the ith tank to the jth tank
q
and can be calculated as Qij (t) = azi Sn sign(hi (t) − hj (t)) 2g|hi (t) − hj (t)|, in
which azi is the real value of the outflow coefficient of pipe i, Sn is the cross
section area of the connection pipe, and g = 9.8m/s2 is the acceleration of
gravity. Q20 (t) is the rate of outflow
p of the liquid from tank 2 and can be
determined by Q20 (t) = az2 Sn 2gh2 (t). ωi (t) is the process noise with the
intensive coefficient b1i . Consequently, substituting the detailed forms of the
above parameters to (6.59) yields
p
˙ 1 (t) = 1 − az1 Sn 2g(h1 (t) − h3 (t)) + Q1 (t)
h
S a
+ b11 ω1 (t)
ḣ (t) = 1 az S p2g(h (t) − h (t)) − az S p2gh (t)
2 Sa 3 n 3 2 2 n 2
(6.60)
+ Q2 (t) + b12 ω2 (t)
ḣ (t) = 1 az S p2g(h (t) − h (t))
3 S a
1 n 1 3
p
− az S 2g(h (t) − h (t)) + b ω (t).
3 n 3 2 13 3
Here, T is the constant sampling period, that is, T = tk+1 − tk . Similarly, the
measurement equation is obtained by the following formula:
(
y1 (tk ) = (1 + sin(tk ))h1 (tk ) + b21 ν1 (tk )
(6.62)
y2 (tk ) = h2 (tk ) + b22 ν2 (tk )
where sin(tk ) reflects the measurement error and νi (tk ) is the measurement
noise with the intensive coefficient b2i .
For convenience, in the sequel, we denote k as the shorthand of tk . Also, the
process noises ωik (i = 1, 2, 3) are assumed to be the same one and obey the
truncated Gaussian distribution, that is, ωik (i = 1, 2, 3) obey the Gaussian
distribution with zero mean and variance Qk and lie within the interval
[r1 , r2 ]. Moreover, the similar assumption is made on the measurement noises
νik (i = 1, 2), that is, νik = νk ∼ N(0, Rk ) (i = 1, 2). From (6.60)–(6.62), system
parameters are given as follows:
T T
B1k = 0.05 0.05 0.05 , B2k = 0.01 0.01 ,
T
B3k = 0.01 0.01 , r1 = −0.5, r2 = 0.5, (6.63)
1 + 0.1sin(k) 0 0
Ck = , Qk = 0.05, Rk = Sk = 0.01
0 1 0
TABLE 6.1
System Parameters
p0 (α0k ) = 0.0005(e9.8933α0k − 1), 0 ≤ α0k ≤ 1
(
10α1k , 0 ≤ α1k ≤ 0.2
p1 (α1k ) = (6.64)
− 2.5(α1k − 1), 0.2 < α1k ≤ 1
p (α ) = 8.5017e−8.5α2k ,
0 ≤ α ≤ 1,
2 2k 2k
0.8
0.6
0.4
0.2
0
0 100 200 300 400 500 600 700 800 900 1000
0.4
0.3
0.2
0.1
0
0 100 200 300 400 500 600 700 800 900 1000
FIGURE 6.4
The fading measurement components yik (i = 1, 2) and their decoded values ȳik .
0.4
0.2
0
0 100 200 300 400 500 600 700 800 900 1000
0.2
0.1
0
0 100 200 300 400 500 600 700 800 900 1000
0.2
0.1
0
0 100 200 300 400 500 600 700 800 900 1000
FIGURE 6.5
The actual state components xik (i = 1, 2, 3) and their estimates x̂ik .
136 Data-Rate-Constrained State Estimation and Control
0.3
0.25
0.2
0.15
0.1
0.05
0
0 100 200 300 400 500 600 700 800 900 1000
FIGURE 6.6
The FE of x1k and its upper bound.
0.3
0.25
0.2
0.15
0.1
0.05
0
0 100 200 300 400 500 600 700 800 900 1000
FIGURE 6.7
The FE of x2k and its upper bound.
Recursive Filtering with Measurement Fading 137
0.3
0.25
0.2
0.15
0.1
0.05
0
0 100 200 300 400 500 600 700 800 900 1000
FIGURE 6.8
The FE of x3k and its upper bound.
0.3
0.2
0.1
0 20 40 60 80 100 120 140 160 180 200
0.3
0.07
0.2 0.06
0.05
0.1 50 100 150
0.2
0.1
0 20 40 60 80 100 120 140 160 180 200
FIGURE 6.9
The upper bounds of filtering errors of xik (i = 1, 2, 3) with single description and two
descriptions.
138 Data-Rate-Constrained State Estimation and Control
0.25
0.2
0.15
0.1
0 100 200 300 400 500 600 700 800 900 1000
0.2
0.07
0.15
0.06
0.1 0.05
300 350 400
0 100 200 300 400 500 600 700 800 900 1000
0.2
0.15
0.1
0 100 200 300 400 500 600 700 800 900 1000
FIGURE 6.10
The effect of fading channel parameter M on filtering performance.
0.3
0.13
0.125
0.12
0.2 0.115
300 400 500
0.1
0 100 200 300 400 500 600 700 800 900 1000
0.2
0.065
0.15
0.06
0.1
300 400 500
0 100 200 300 400 500 600 700 800 900 1000
0.2
0.1
0.15 0.09
0.08
0.1 300 400 500
0 100 200 300 400 500 600 700 800 900 1000
FIGURE 6.11
The filtering errors of xik (i = 1, 2, 3) and their upper bounds with different noise intensities.
Recursive Filtering with Measurement Fading 139
0.3
0.2
0.1
0 100 200 300 400 500 600 700 800 900 1000
Time (k)
0.2
0.15
0.1
0 100 200 300 400 500 600 700 800 900 1000
Time (k)
0.2
0.15
0.1
0 100 200 300 400 500 600 700 800 900 1000
Time (k)
FIGURE 6.12
The filtering errors of xik (i = 1, 2, 3) and their upper bounds with different packet-arrival
probabilities.
0.3
0.2
0.1
0 100 200 300 400 500 600 700 800 900 1000
0.2
0.15
0.1
0 100 200 300 400 500 600 700 800 900 1000
0.2
0.15
0.1
0 100 200 300 400 500 600 700 800 900 1000
FIGURE 6.13
The effect of the model uncertainty on the filtering performance.
140 Data-Rate-Constrained State Estimation and Control
MDC-based filtering scheme performs very well and the considered system
complexities do have a major effect on the filtering performance.
In order to examine the sensitivity of the developed filter to the model
uncertainty, a simulation test has been conducted. In this case, the terms
hi (tk ) (i = 1, 2, 3) in (6.61) have been replaced by (1 + ℜi (tk ))hi (tk ) where
ℜi (tk ) (i = 1, 2, 3) represent the parameter uncertainties and are taken as
ℜi (tk ) = ℜ̄i exp ( − 0.1tk ) with ℜ̄i being positive scalars. It is easy to see that ℜ̄i
satisfies |ℜi (tk )| ≤ ℜ̄i . It is observed from Figure 6.13 that as the degree of the
model uncertainties increases (i.e. the increase of ℜ̄i ), the upper bound of the
filtering error variance grows accordingly, which indicates that the proposed
filter is sensitive to the model uncertainties. One of our future investigations
would be focused on the improvement of the robustness for the developed
filtering scheme.
6.5 Summary
In this chapter, a multiple description coding scheme has been employed to
deal with the recursive filtering issue for a class of discrete-time nonlinear
stochastic networked systems. The Mth-order Rice fading model has been
adopted to describe the measurement fading from the sensor to the encoder.
By utilizing the distorted data resulting from the channel fading, coding
process and measurement noises, a recursive sub-optimal filter has been
designed to estimate the actual system state. In addition, a minimized upper
bound of filtering error variance has been derived and the corresponding
filter parameter has been explicitly determined by solving the coupled
algebraic Riccati-like difference equations. Finally, a simulation example has
been given to demonstrate the effectiveness of the proposed filtering strategy.
7
Stabilization of Linear Discrete-Time
Systems over Resource-Constrained Networks
under Dynamical Multiple Description
Coding Scheme
where x(k) ∈ Rn is the system state, u(k) ∈ Rr is the control input signal, and
A and B are known matrices with appropriate dimensions.
In an NCS framework, the system states are transmitted to the controller
via a resource-constrained communication media. Accordingly, the MDC
scheme is introduced with a view to enhancing the reliability of signal
transmission. Without loss of generality, we consider the case of two
descriptions in this paper. To be more specific, the data is first encoded
into two descriptions in terms of certain coding criterion, and the obtained
descriptions are subsequently transmitted to the decoding devices via the
two independent channels (labeled as “C1” and “C2”), respectively. In
addition, the component-based MDC is adopted in this paper in order to
meet the requirement of encoding each component xi (k) (i ∈ N , {1, 2, . . . , n})
of the system state x(k).
For the ith state component, a scalar-valued encoder is constructed as
follows:
(
εi (τ h) = f1i xi (τ h)
(7.2)
σi (τ h) = f2i xi (τ h)
where g1i ( · ) and g2i ( · ) are two side decoding functions, and gci (·, ·) is the
central decoding function. x̂i (τ h) is the decoded value of xi (τ h). The random
variables γi (τ h) (i = 1, 2) are two Bernoulli-distributed sequences with the
following probability distributions:
144 Data-Rate-Constrained State Estimation and Control
FIGURE 7.1
The structure of the closed-loop control system with the MDC scheme.
γ2 (τ h) = 0), the description packet ε(τ h) is available and the side decoder 1
(labeled as “SD1”) is enabled to perform the decoding operation. Furthermore, if the
packet-dropout occurs in both channels “C1” and “C2” (i.e. γ1 (τ h) = γ2 (τ h) = 0),
none of the description packets is available and all the decoders fail to work. In this
case, without loss of generality, we assume that the decoded value x̂(τ h − 1) is used
to generate the control signal.
In this paper, the remote control scenario is considered that the encoder and
controller are deployed at different places. The schematic structure is shown
in Figure 7.1, where the network-based communication scheme is employed
and descriptions generated by two encoders are transmitted to the remote
controller via bandwidth-constrained network channels. The main purpose
of this paper is to investigate the remote control issue under the dynamical
MDC scheme. In particular, we aim to
two steps, namely, the index generation step and the index assignment
step. For the step of index generation, the uniform quantization method is
employed to generate the indices and, for the step of index assignment, the
nested index assignment principle [156] is adopted to assign the generated
indices to a certain mapping matrix.
In the sequel, we slightly abuse the notation by using x, ε, σ , εi , σi and xi to
denote x(τ h), ε(τ h), σ (τ h), εi (τ h), σi (τ h) and xi (τ h), respectively.
Index Generation Scheme
For a scalar quantizer Q(·) : R 7→ R, the scaling parameter s and the positive
integer N correspond to the quantization range and the quantization level,
respectively.
Let us divide the hyperrectangles Hs = {x ∈ Rn : |x|∞ ≤ s} into Nn parts
H1,p1 (s) × H2,p2 (s) × · · · × Hn,pn (s) with equal volume, where p1 , p2 , . . . , pn ∈
{1, 2, . . . , N} and
2s
Hi,1 (s) , xi | − s ≤ xi < −s +
N
2s 4s
Hi,2 (s) , xi | − s + ≤ xi < −s +
N N
..
. (7.8)
2s
Hi,N (s) , xi |s − ≤ xi ≤ s
N
φi (xi ) = pi (7.9)
Noticing the fact that x ∈ H1,p1 (s) × H2,p2 (s) × · · · × Hn,pn (s), one directly
obtains the following relationship:
s
|x − ξ(p, s)|∞ ≤ . (7.11)
N
where ϕ1i ( · ) and ϕ2i ( · ) are the row assignment function and the column
assignment function, respectively, and εi and σi are two descriptions of xi .
Remark 7.2: As stated in [156], the nested assignment principle stipulates that the
indices are placed in the cells that lie on the main diagonal and its nearest 2d diagonals
of the mapping matrix. For the convenience of the exposition, the scenario d = 1 is
discussed in this paper, which means that the indices are placed in the cells lying
on the main diagonal and its nearest 2 diagonals of the mapping matrix. Figure 7.2
gives an example of the nested assignment principle with l = 8 and d = 1.
FIGURE 7.2
Nested index assignment for l = 8, d = 1.
148 Data-Rate-Constrained State Estimation and Control
8i (pi ) ,(εi , σi )
(r + 1, ri + 1), if qi =1
i
(ri + 1, ri ), if qi = 0 and ri is even
(7.13)
= (ri , ri + 1), if qi = 0 and ri is odd
(ri + 2, ri + 1), if qi = 2 and ri is even
(ri + 1, ri + 2), if qi = 2 and ri is odd
p p
where ri = ⌊ 2d+1
i
⌋ and qi = h 2d+1
i
i. As such, it is not difficult to verify that all
the indices pi are mapped to the corresponding description pairs (εi , σi ).
and thus, the value of ψ (εi , σi ) (denoted as p̂ci ) is the estimation of the index
pi . It is obvious that the estimation accuracy is 100%, namely, p̂ci = pi .
Stabilization of Linear Discrete-Time Systems 149
Case II: only one of the description packet (either ε or σ ) is received by the
side decoder. In this situation, the index estimation function ψ( · ) : Z+ 7→ Z+
for the index component pi is defined by
Prob{θ (τ h) = 0} = θ̄0
Prob{θ (τ h) = 1} = θ̄1 (7.16)
Prob{θ (τ h) = 2} = θ̄2
where
Encoder: at each coding instant τ h (τ = 0, 1, 2, . . . ), for the system state x(τ h),
the coding function is designed as follows:
(
εi (τ h) , ϕ1i (φi (x̃i (τ h)))
(7.17)
σi (τ h) , ϕ2i (φi (x̃i (τ h))), i = 1, 2, . . . n
where x̃i (τ h) is the ith component of x̃(τ h) and x̃(τ h) , x(τ h) − x̄(τ h) ∈
H1,p1 (s(τ h)) × H2,p2 (s(τ h)) × · · · × Hn,pn (s(τ h)). Moreover, the dynamics of
x̄(k) satisfies
150 Data-Rate-Constrained State Estimation and Control
(
x̄(k) = Ax̆(k − 1) + Bŭ(k − 1), ∀ k > 0
(7.18)
x̄(0) = 0
f1i (xi (τ h)) = ϕ1i (φi (x̃i (τ h))), f1 (x(τ h)) = ϕ1 (φ(x̃(τ h)))
f2i (x(τ h)) = ϕ2i (φi (x̃i (τ h))), f2 (x(τ h)) = ϕ2 (φ(x̃(τ h)))
where
ϕ1 (φ(x̃(τ h))) , [ϕ11 (φ1 (x̃1 (τ h))) · · · ϕ1n (φn (x̃n (τ h)))]T
ϕ2 (φ(x̃(τ h))) , [ϕ21 (φ1 (x̃1 (τ h))) · · · ϕ2n (φn (x̃n (τ h)))]T .
where
Remark 7.3: It is observed from (7.16) and (7.20) that: 1) θ(τ h) = 2 indicates the
successful transmissions of both ε(τ h) and σ (τ h), under which the estimated index
p̂c (τ h) is obtained; 2) θ (τ h) = 1 implies that one of the packet (either ε(τ h) or
Stabilization of Linear Discrete-Time Systems 151
σ (τ h)) is lost during the transmission, and hence the index p̂s (τ h) is estimated; and
3) θ(τ h) = 0 means the simultaneous transmission failures of both ε(τ h) and σ (τ h),
under which the estimation of the index vector p(τ h) is set as 0, namely, p̂(τ h) = 0.
ξ(p̂(τ h), s(τ h)) = δ{θ (τ h), 2}ξ(p̂c (τ h), s(τ h))
(7.21)
+ δ{θ (τ h), 1}ξ(p̂s (τ h), s(τ h)),
which infers that ξ(p̂(τ h), s(τ h)) is set to be 0 when both of the vector-valued
descriptions (i.e. ε(τ h) and σ (τ h)) are lost (i.e. θ (τ h) = 0).
It should be emphasized that the model (7.21) reflects all the cases of the
reception of ε(τ h) and σ (τ h) at the decoder side, based on which we intend
to tackle with the decoder design issue.
Decoder: at the decoder side, the decoding function is designed with the
following form:
x̂(k + 1) = Ax̂(k) + Bu(k), k 6 = τ h − 1
x̂(τ h) = Ax̂(τ h − 1) + Bu(τ h − 1)
+ ξ(p̂(τ h), s(τ h)) (7.22)
u(k) = Kx̂(k)
x̂(0) = 0
where A , A + BK.
Lemma 7.1: Let the coding procedure (7.17)–(7.19) be given. The following
relationship
¯h
µ ¯
s(τ h) = s((τ − 1)h) + ζh b((τ − 1)h) (7.25)
N
we obtain
h
X
¯
x(h) − x(h) = Ah xE1 (0) + Ah−i BKAi−1 xE2 (0),
i=1
Stabilization of Linear Discrete-Time Systems 153
which gives
¯h
µ
E{kx(h) − x̄(h)k∞ } ≤ s(0) + ζh b̄(0).
N
x((j + 1)h) − x̄((j + 1)h) = AxE1 ((j + 1)h − 1) + BKxE2 ((j + 1)h − 1)
= A2 xE1 ((j + 1)h − 2) + ABKxE2 ((j + 1)h − 2)
+ BKxE2 ((j + 1)h − 1)
= Ah xE1 (jh) + Ah−1 BKxE2 (jh) + Ah−2 BKxE2 (jh + 1)
+ Ah−3 BKxE2 (jh + 2) + · · · + ABKxE2 ((j + 1)h − 2)
+ BKxE2 ((j + 1)h − 1).
By using the fact xE2 (i) = Ai−jh xE2 (jh) for i = jh + 1, jh + 2, · · · , (j + 1)h − 1 again,
one has
h
X
x((j + 1)h) − x̄((j + 1)h) = Ah xE1 (jh) + Ah−i BKAi−1 xE2 (jh),
i=1
which implies
Consequently, we have
µ¯n ¯ jh)
E{kx((j + 1)h) − x̄((j + 1)h)k∞ } ≤ s(jh) + ζh b(
N
= s((j + 1)h),
synchronized at both the encoder side and the decoder side. This means
that the synchronization of the quantization interval s(τ h) can be always
guaranteed at the encoder side and the decoder side no matter whether the
packet dropout occurs or not.
Lemma 7.2: Let the coding procedure (7.17)–(7.19) and the decoding procedure
(7.22) be given. The error between the auxiliary system state x̆(k) and the decoded
value x̂(k) satisfies
4 ¯
with b(0) , 0, ν , N θ1 + θ̄0 and τ = 1, 2, . . ..
Proof: The mathematical induction is applied again to the proof of this lemma.
For τ = 1, it follows from (7.19) and (7.22) that
and
Lemma 7.3: The sequences s(τ h) and b(τ h) (τ = 1, 2, . . . ) in Lemma 7.1 and
Lemma 7.2 satisfy
¯h
µ
s(τ h) = s((τ − 1)h) + ζh b̄((τ − 1)h)
N
b(τ h) = µh b((τ − 1)h) + νs(τ h).
156 Data-Rate-Constrained State Estimation and Control
and (
B(τ h) = µh B((τ − 1)h) + ν S(τ h)
B(0) = b(0).
It is obvious that
Substituting the dynamics S(τ h) into B(τ h), we further obtain that
Denoting η(τ h) , [S(τ h) B(τ h)]T , the dynamics of the augmented system is
acquired as
η (τ + 1)h = h η(τ h)
lim η(τ h) = 0,
τ →∞
lim E{ke(k)k} = 0
k→∞
In order to prove that the decoding error e(k) achieves the stochastic stability, in
what follows, we will show that
lim E{ke(k)k} = 0
k→∞
for k = τ h and
τ h ≤ k < (τ + 1)h (τ = 1, 2, . . . ).
1
≤ s(τ h) + b(τ h) (τ = 1, 2, . . . ),
N
For τ h ≤ j < (τ + 1)h, it is easily seen from the proofs of Lemmas 7.1–7.2 that
and
j−τ h
E{kxE2 (j)k∞ } ≤ kAk∞ b(τ h)
where
j−τ h
X
j
kA k∞ , µ̄j , ζj−τ h , k Aj−τ h−i BKAi−1 k∞ .
i=1
Letting
j−τ h
ℓ , max{µ
¯ j , ζj−τ h kAk∞ } (τ h ≤ j < (τ + 1)h),
we have
Theorem 7.1: The closed-loop system (7.23) is stochastically stable if the conditions
ρ(A) < 1 and ρ(h ) < 1 are simultaneously satisfied, where h is defined in
Lemma 7.3.
Proof: It follows from the dynamics of the closed-loop system (7.23) that
k
X
x(k) = Ak x(0) − Ak−i BKe(i − 1),
i=1
which leads to
k
X
E{kx(k)k} ≤ kAk kkx(0)k + kAkk−i kBKkE{ke(i − 1)k}.
i=1
Since the modulus of the eigenvalues of h lies in the unit circle on the complex plane,
it is known from Lemma 7.4 that E{ke(i − 1)k} is bounded, whose upper bound is
¯ Accordingly, we further derive that
denoted by e.
k
X
E{kx(k)k} ≤ kAk kkx(0)k + kAkk−i kBKkē
i=1
kBKke¯(1 − kAkk )
= kAk kkx(0)k + .
1 − kAk
we confirm that
kBKkē
lim E{kx(k)k} ≤ .
k→∞ 1 − kAk
Stabilization of Linear Discrete-Time Systems 159
k
X
h̄k , kAk−i kBKkE{ke(i − 1)k}, ℓk , kAk−k .
i=1
lim ℓk = ∞,
k→∞
h¯ k h¯ k+1 − h̄k
lim = lim = 0,
k→∞ ℓk k→∞ ℓk+1 − ℓk
which yields
lim E{kx(k)k} = 0.
k→∞
The following corollary is put forward to analyze the influences from the
encoder parameters and the probability of packet dropouts on the feasibility
of the addressed MDC-based control problem.
Corollary 7.1: Suppose that the spectral radius of matrix A satisfies ρ(A) < 1. The
closed-loop system (7.23) is stochastically stable if the probability of the simultaneous
packet dropout of both communication channels satisfies the following relationship:
µ̄h
(1 − N )(1 − µh ) 4
θ¯0 ≤ − θ¯1 . (7.28)
ζh N
r !
1 µ̄h µ̄h 2
λ1 = + νζh + µh + ( + νζh − µh ) + 4νζh µh
2 N N
r !
1 µ̄h µ̄h
λ2 = + νζh + µh − ( + νζh − µh )2 + 4νζh µh .
2 N N
which implies that the equation λ2 (ν) = −1 is infeasible. In this sense, letting
λ1 (ν) = 1 yields
¯h
µ
(1 − N )(1 − µh )
ν=
ζh
and the proof of this corollary is therefore complete.
Corollary 7.2: Suppose that the spectral radius of matrix A satisfies ρ(A) < 1.
The closed-loop system (7.23) is stochastically stable if the encoder parameter N
(i.e. quantization level) satisfies the following relationship:
where all the parameters on the right-hand side of the above inequality have been
defined previously.
λi > 0 (i = 1, 2).
1
Consider the fact that λ2 is a monotonically increasing function with respect to N
on [0, +∞). Then, solving the equation λ2 ( N1 ) = 1 gives
Stabilization of Linear Discrete-Time Systems 161
1 1 νζh
= − .
N µ̄h µ̄h (1 − µh )
It is inferred from (7.29) that the requirement h < 1 is met and, therefore, the
stochastic stability of the closed-loop system (7.29) is guaranteed. The proof of this
corollary is complete.
Remark 7.5: Corollary 7.1 (Corollary 7.2) reveals the relationship between the
occurrence probability packet dropouts (the quantization level of the coding function)
and the system stability. To be more specific, in Corollary 7.1, an upper bound of the
probability of the simultaneous packet dropouts of both channels (i.e. θ̄0 ) is obtained,
which poses a basic constraint on the communication quality of the channels. Then,
¯h
the relationship between system parameters (e.g. µN , µh , N and ζh ) and the bound
upper is explicitly characterized. In Corollary 7.2, a lower bound of the quantization
level N is determined, from which we can conclude that such a lower bound is
dependent on the major system parameters (e.g. µ̄h , θ̄0 , θ̄1 , ζh and µh ). In particular,
it is readily seen from the right-hand sides of (7.28) and (7.29) that 1) the derived
upper bound of the probability of the simultaneous packet dropouts increases with
the growth of the quantization level N, and 2) the acquired lower bound of the
quantization level N decreases with the descent of the packet-dropout probabilities
θ̄0 and θ̄1 , and such observations are in agreement with the practice.
Remark 7.6: In comparison with the existing studies, the main results of this paper
exhibit the following distinctive contributions: 1) the MDC strategy developed in this
paper is new in the sense that the dynamical uniform quantization approach is, for
the first time, adopted to cope with the unreliability of the communication channel;
2) the constructed control scheme is new that ensures the stochastic stability of the
controlled system subject to distorted control signals; and 3) the obtained stability
criterion is new that reveals the influence of both the system parameters and the
encoder parameters on the stability.
1
The amplitude of the state strategies without
0.5
0
control scheme
-0.5
-1
-1.5
-2
-2.5
-3
0 10 20 30 40 50 60 70 80 90 100
k/time step
FIGURE 7.3
State trajectories of the open-loop system.
Stabilization of Linear Discrete-Time Systems 163
1
The amplitude of the state strategies with the
0.5
proposed control scheme
-0.5
-1
-1.5
0 10 20 30 40 50 60 70 80 90 100
k/time step
FIGURE 7.4
State trajectories of the closed-loop system.
1
The amplitude of the state
trajectories and their
decoded values
0.5
-0.5
-1
0 10 20 30 40 50 60 70 80 90 100
k/time step
0.5
The amplitude of the state
trajectories and their
0
decoded values
-0.5
-1
-1.5
0 10 20 30 40 50 60 70 80 90 100
k/time step
FIGURE 7.5
State trajectories and their decoded values.
164 Data-Rate-Constrained State Estimation and Control
1
Decoding error
0.5
-0.5
-1
0 10 20 30 40 50 60 70 80 90 100
k/time step
0
Decoding error
-0.5
-1
0 10 20 30 40 50 60 70 80 90 100
k/time step
FIGURE 7.6
The trajectories of decoding errors.
7.4 Summary
This paper has dealt with the stabilization problem for a class of
linear discrete-time systems under a resource-constrained channel. A new
dynamical multiple description coding approach has been developed
to cope with the unreliability of the communication channel. Two
sequences of Bernoulli-distributed random variables with known probability
Stabilization of Linear Discrete-Time Systems 165
-1
0 10 20 30 40 50 60 70 80 90 100
-1
0 10 20 30 40 50 60 70 80 90 100
FIGURE 7.7
The Bernoulli sequences γi (τ h) (i = 1, 2).
The past few decades have witnessed a surge of research interest on the
dynamics analysis of networked control systems (NCSs) due primarily to
their pervasive applications in real-world industrial systems. Because of the
digital nature of the communication network, the original analog signal is
required to be converted into the digitized one with finite number of bits,
which inevitably results in the conversion error. Generally speaking, a high
bandwidth (i.e. bit rate) of the communication channel gives rise to a small
conversion error and little control performance degradation. However, in
most of practical applications (such as micro-electro mechanical systems,
sensor networks and industrial control networks), the network resource is
scarce and the available bit rate of the network is often limited. Thus, it is of
both theoretical significance and practical importance to look for a bit-rate
condition as tight as possible under which the prescribed control objective is
guaranteed.
In general, the network bandwidth occupancy of a data transmission task
is determined by two factors: the bits of the data itself and its communication
frequency. From this point of view, in order to comply with the bit-rate
requirement of a digital communication channel, the signal usually needs to
be “compressed” before being transmitted. One of the effective compression
approaches is the utilization of certain coding algorithms to encode the raw
data into specific codewords which occupy fewer bits. More specifically, the
data encoding/decoding operation in closed-loop systems can be generally
described as follows: 1) the sender encodes the state/measurement signals
into the corresponding codewords by certain appropriate coding schemes;
and 2) the generated codewords are transmitted to the decoder and suited
decoding algorithms are applied to reconstruct the raw data by means of
the received codewords. It should be pointed out that since the codewords
carry only partial information of the raw data, how to develop an ingenious
encoding-decoding algorithm to recover the raw data with an acceptable
accuracy level appears to be quite crucial.
In recent years, considerable research effort has been directed toward the
control problems for networked systems under certain bit-rate conditions, in
most of which, the implementation of the encoding algorithms is governed
by a time-scheduled manner due to its simplicity in design, that is, the
encoder generates and sends the codewords periodically at those fixed
time instants. However, under such a circumstance, the encoder could
potentially cause unnecessary coding actions as well as a high codeword
transmission frequency. This would further induce a severe occupancy of the
network resource, which is actually a challenge for the practical networked
systems subject to the limited network bandwidth. In order to mitigate the
occupancy of the network bandwidth, apart from the adoption of certain
coding strategies mentioned above, another effective way is to reduce the
triggering ratio of the encoding operation.
Benefiting from the swift development of the digital control technology
in the past decades, the data interaction in most engineering applications
has been upgraded to the digital manner, and thus the event-triggered
control strategy has been attracting substantial research attention. It is
worth mentioning that, in engineering practice, the event-based control
strategy is usually executed by a digital control device, which constitutes
the so-called sampled-data control system. Among others, a prevalent
approach is to utilize the time-based periodic sampling strategy to update
the control signal by selecting a feasible sampling period. Instead of the time-
triggered sampled-data control problems, the corresponding topics related
to the event-triggered sampling mechanism have recently gained particular
research attention. The most outstanding advantage of the event-triggered
sampled-data control strategy is that the controller is updated only if some
conditions are met, and therefore it might be more efficient in reducing the
controller update frequency and prolonging the controller operating lifespan.
However, to the best of the authors’ knowledge, in most of the published
results, only the event-based sampled-data control problem has been taken
into account, when it comes to the simultaneous consideration of the bit-rate
condition, the related results on this topic are quite few.
In response to the discussions aforesaid, in this paper, we aim to deal
with the control problem for continuous-time linear systems via an event-
triggered difference coding strategy, under which the corresponding bit rate
conditions are derived. In fact, such an investigation is non-trivial with
the following three major challenges: 1) how to design an event-triggered
communication mechanism to schedule the updates of both the coder and
the controller in a unified way? 2) how to reveal the relationship between the
required bit rate and the system parameters? 3) how to develop appropriate
methodologies to analyze the dynamics of the closed-loop system and
synthesize the controller design? This motives our investigation in this
chapter.
168 Data-Rate-Constrained State Estimation and Control
d
x(t) = Ax(t) + Bu(t) (8.1)
dt
where x(t) ∈ Rn represents the state vector and u(t) ∈ Rp is the control input.
The initial state x(0) is bounded belonging to a given set X0 . A and B are
known matrices with appropriate dimensions. In this paper, it is assumed
that at least one of the eigenvalues of A has positive real part, that is, the
open-loop system is unstable.
From the resource-saving point of view, in a networked circumstance, it is
preferable that the data transmission is executed in an event-driven manner.
To this end, inspired by the idea in [73, 89, 90], an event-based coding scheme
is developed in this paper, which is shown in Figure 8.1. It should be pointed
out that the coder design is based on the idea of the difference coding scheme,
which means that the input signal of the coder is the difference between the
system state and the previous decoder (to be designed later) state. In order
to access the decoder state at the encoder side and avoid the signal postback
(i.e. signal flows from the decoder to the encoder), the following auxiliary
system, which can be viewed as a “copy” of the decoder, is constructed:
d x (t) = Ax (t) + Bu (t) (8.2a)
a a a
dt
xa (t+ −
k ) = xa (tk ) + Lθ (sk )η(tk ) (8.2b)
FIGURE 8.1
The schematic of the event-based control with encoding-decoding scheme.
An Event-Triggered Encoding Approach 169
where xa (t) ∈ Rn and ua (t) ∈ Rp are, respectively, the state and the control
input of the auxiliary system. xa (t+ −
k ) and xa (tk ) are, respectively, defined as
xa (t− +
k ) , limt→tk xa (t) and xa (tk ) , limt→tk xa (t). sk is the encoding instant
− +
and tk is the time instant when both the decoder and the auxiliary system
receive the data packet θ (sk ) , vecn {θi (sk )} with θi (sk ) (i = 1, 2, . . . , n) being
the codewords encoded by the i-th encoder at time instant sk . τ , tk − sk ≥ 0
is the time delay caused by the encoding process. L ∈ Rn×n and η(tk ) ∈ R are
the parameters to be designed later.
Denoting by 0 = s0 < s1 < · · · sk < sk+1 < · · · the sequence of event
occurring instants (encoding instants) and setting x̃a (sk ) , x(sk ) − xa (sk ) as
the encoder input. The encoding procedure is triggered when the following
event generation condition is satisfied:
where f (x̃a (sk ), σ (sk )) , kx̃a (sk )k − σ (sk ) is called the triggering function and
σ ( · ) is an exponentially decaying function defined as σ (t) , σ0 e−λt with σ0
being a given positive scalar and λ being a parameter to be determined.
The triggering instants (or encoding instants) can be successively
calculated by the following formula:
Next, denote by x̃ai (t) the ith component of x̃a (t). As such, at the triggering
time sk , for each component x̃ai (t) (i = 1, 2, . . . , n), the individual codeword
θi (sk ) is determined by the following rule:
where xd (t) ∈ Rn is the decoder state, u(t) is the control input to be designed
and other parameters are the same as the auxiliary system (8.2a)-(8.2b).
It is seen from (8.2b) and (8.6b) that, with the obtained data packet θ(sk ),
both the auxiliary system state xa (t) and the decoding system state xd (t) are
simultaneously updated at time tk . Moreover, by employing the zero-order
170 Data-Rate-Constrained State Estimation and Control
holder (ZOH) strategy, the control input u(t) in (8.1) and (8.6a) is updated at
tk and will maintain constant until the next event time tk+1 , that is,
and, along the same line, the controller ua (t) in (8.2a) is designed as
Remark 8.1: In this paper, an event-based update mechanism is employed for the
purpose of reducing the frequency of both the data transmission and the controller
update. To be more specific, when the event generation condition (8.3) is satisfied
at the time instant sk , the encoder starts to implement the encoding procedure. In
addition, owing to the existence of the time delay during the encoding process, the
codeword θi (sk ) is only available to both the auxiliary system and the decoder system
at tk . Then, based on the renewed system states xa (tk ) and xd (tk ), the control input
is updated at tk . Therefore, not only the encoder executions but also the controller
updates are dependent on the event function (8.3), and such an event-triggered
mechanism achieves a great reduction of the update frequency of both the coder and
the controller.
Proof: In order to make our statement clearer, the exclusion of the “Zeno” behavior
is conducted by the following two steps.
Step I. In this step, our intention is to ensure that there is no any other triggering
instant(s) over the interval (sk , tk ), which is equivalent to show that sk+1 > tk . To
begin with, it follows from (8.1) and (8.2a)–(8.2b) that the dynamics of the x̃a (t) is
governed by
d x˜ (t) = Ax̃ (t) (8.9a)
a a
dt
x̃a (tk ) = x̃a (tk− ) − Lθ (sk )η(tk ).
(8.9b)
For t ∈ (sk , tk ), the evolution of the state trajectorypx̃a (t) can be determined by
x̃a (t) = eA(t−sk ) x̃a (sk ), which indicates that kx̃a (t)k = x̃Ta (sk )A(t − sk )x̃a (sk ) with
T
A(t − sk ) , eA (t−sk ) eA(t−sk ) . Due to the inverse property of the matrix exponential,
it is easy to verify that A(t − sk ) is a positive definite matrix and there exists
a positive scalar function ϕ(t − sk ) > 0 such that A(t − sk ) ≥ ϕ 2 (t − sk )I
for ∀t ∈ (sk , tk ). Based on such a fact, one can further confirm that kx̃a (t)k ≥
ϕ(t − sk )kx̃a (sk )k = ϕ(t − sk )σ (sk ) for ∀t ∈ (sk , tk ). Recalling that σ (t) can be
rewritten as σ (t) = e−λ(t−sk ) σ (sk ) for ∀t ∈ (sk , tk ), it is obvious that there must
exist a suitable λ meeting the requirement ϕ(t − sk ) > e−λ(t−sk ) , which leads to
kx̃a (t)k > σ (t). Consequently, the triggering event is excluded over the interval
(sk , tk ) by properly choosing the parameter λ.
Step II. In this step, we are interested in investigating the length of sk+1 − tk
and subsequently determining a lower bound of the inter-event execution interval
sk+1 − sk . To this end, our attention is focused on the dynamics evolution of kx̃a (t)k
over the time interval [tk , sk+1 ). For t ∈ [tk , tk+1 ), the upper right-hand Dini
derivative of kx̃a (t)k satisfies
1 Aτ λτ
Letting L = 2n e e and η(t) = σ (t), it follows from (8.9b) that
1 Aτ λτ
x̃a (tk ) = x̃a (t−
k )− e e θ (sk )σ (tk )
2n
(8.12)
A(tk −sk ) 1 Aτ λτ
=e x̃a (sk ) − e e θ(sk )σ (tk ).
2n
Also, it is inferred
n from o (8.3) and (8.5) that x̃a (sk ) = 6(sk )θ(sk )σ (sk ), where
σi (sk )
6(sk ) = diagn σ (s ) with σi (sk ) = |x̃ai (sk )|. Substituting x̃a (sk ) = 6(sk )θ(sk )
k
σ (sk ) into (8.12) yields
In addition, it is observed from (8.9a) that, over the interval [tk , sk+1 ), the state
trajectory of x̃a (t) can be determined by
and, by means of the matrix norm inequalities, one can further derive that
A(t−tk ) Aτ 1
kx̃a (t)k = e e 6(sk ) − In θ(sk )eλτ eλ(t−tk ) σ (t)
2n
1
≤ eA(t−tk ) eAτ 6(sk ) − In θ(sk ) eλτ eλ(t−tk ) σ (t)
2n
1
≤ ekAk(t−tk ) ekAkτ (6(sk ) − In )θ(sk ) eλτ eλ(t−tk ) σ (t)
2n
An Event-Triggered Encoding Approach 173
1
= 6(sk ) − In θ (sk ) e(kAk+λ)(t+τ −tk ) σ (t)
2n
1
= 6(sk ) − In θ (sk ) e(kAk+λ)(t−sk ) σ (t). (8.15)
2n
1
(6(sk ) − In )θ (sk ) = 6̄(sk ) (8.16)
2n
where
v !
2
σi (sk )σ (sk ) σ 2 (sk )θi (sk )
u n
uX 1 2
¯ k) = t
6(s σi ( s k ) − + .
σ 2 (sk ) n 4n2
i=1
σ1 (sk ) + · · · + σn (sk ) √
1≤ ≤ n. (8.17)
σ (sk )
where λ1 = λ + kAk.
Letting δ1 eλ1 (t−sk ) = 1, we have
ln δ11
t − sk , κ = , (8.20)
λ1
namely,
t − tk = κ − τ = 1Ta , (8.21)
which further indicates that, for t ∈ [tk , tk + 1Ta ), kx̃a (t)k < σ (t). Consequently, it
is seen from the encoding event generation condition (8.3) that sk+1 − sk ≥ κ, and
the “Zeno” behavior is thus eliminated.
174 Data-Rate-Constrained State Estimation and Control
Proof: In the proof of Lemma 8.1, one has kx̃a (t)k < σ (t) for ∀t ∈ [tk , sk+1 ).
Subsequently, we intend to study the dynamics of kx̃a (t)k over the time interval
[sk+1 , tk+1 ). With the combination of (8.3) and (8.9a), it is readily seen that, for
∀t ∈ [sk+1 , tk+1 ), one has kx̃a (t)k ≤ ekAk(t−sk+1 ) kx̃a (sk+1 )k = eλ1 (t−sk+1 ) σ (t) ≤
eλ1 τ σ (t). Therefore, it is obvious that kx̃a (t)k ≤ σ̄0 e−λt for ∀t ≥ 0, which shows that
x̃a (t) exponentially converges to zero.
It is obvious from xa (t) ≡ xd (t) ∀t ≥ 0 that x̃a (t) ≡ x̃d (t) ∀t ≥ 0. Thus,
it follows immediately from Lemma 8.2 that the decoding error x̃d (t) is
exponentially convergent under the encoding-decoding scheme (8.3)–(8.6b).
Remark 8.2: It can be observed from Lemma 8.1 and the convergence analysis of
decoding error that the value of κ is associated with two parameters, namely, the
convergence rate of the triggering threshold λ (also the convergence rate of the
decoding error) and the system dimension n. On one hand, a larger λ leads to a
smaller κ, which means that as the convergence rate of the decoding error becomes
larger, the execution of the encoding operation would be more frequent. On the other
hand, the increase of the system dimension n would cause a decline of κ, which
signifies that a higher dimensional system may cost more resources in order to ensure
the feasibility of the coding-decoding algorithm.
Theorem 8.1: Consider the system (8.1) with the event-based encoding-decoding
scheme (8.3)–(8.6b). The convergence of the decoding error x̃d (t) is guaranteed
(i.e. limt→∞ kx̃d (t)k = 0) if the bit rate of the communication channel R satisfies
R ≥ R1 , n⌈ κ1 ⌉.
An Event-Triggered Encoding Approach 175
Proof: It follows from Lemmas 8.1-8.2 that the convergence of the decoding error is
guaranteed. In addition, it is easy to see from sk+1 − sk ≥ κ in Lemma 8.1 that there
are at most ⌈ κ1 ⌉ times’ packet transmissions per time unit. Since each transmission
of the packet θ(sk ) occupies n bits, it suffices to use the bit rate of n⌈ κ1 ⌉ to guarantee
that limt→∞ kx̃d (t)k = 0, which completes the proof of this theorem.
Proof: It follows from (8.14) that, for ∀t ∈ [tk , tk+1 ), the dynamics of x̃a (t) can be
rewritten as
1
x̃a (t) = eA(t−tk ) eAτ 6(sk ) − In θ(sk )eλτ eλ(t−tk ) σ (t)
2n
(8.22)
1
= eA(t−sk ) 6(sk ) − In θ (sk )eλ(t−sk ) σ (t).
2n
In addition, noting that eA(t−sk ) is invertible with the inverse matrix e−A(t−sk ) , one
obtains
176 Data-Rate-Constrained State Estimation and Control
1
e−A(t−sk ) x̃a (t) = 6 (sk ) − In θ (sk )eλ(t−sk ) σ (t), (8.23)
2n
which further derives
ln δ1
holds. Letting δ0 eλ0 (t−sk ) = 1 yields t−sk = λ00 , ι. Considering both the encoding
event generation condition (8.3) and the fact that the dynamics x̃a (t) satisfying
ln δ1
kx̃a (t)k ≥ σ (t) for t ∈ [tk + λ0
0
− τ , tk+1 ), it is easy to see that sk+1 − tk ≤ 1Tb ,
ln δ1
0
where 1Tb = λ0 − τ.
Theorem 8.2: Consider the system (8.1) with the event-based encoding-decoding
scheme (8.3)–(8.6b). The decode error x̃d (t) diverges if the bit rate of the
communication channel is less than R0 , n⌊ 1ι ⌋.
Proof: It is inferred from (8.25) that there are at least ⌊ 1ι ⌋ times’ data transmissions
each time unit. Along the similar line in the proof of Theorem 8.1 that each
transmission of the packet θ (sk ) occupies n bits, we can conclude that it is
impossible to transmit all the generated codewords to the decoder if the bit rate of
the communication channel is less than n⌊ 1ι ⌋, which consequently results in the
divergence of the decoding error x̃d (t). The proof of this theorem is ended.
Theorem 8.3: Let the positive scalars µ, σ0 and α be given. Under the conditions
in Lemmas 8.1 and 8.3, the closed-loop system (8.27) is exponentially stable by the
event-based control strategy (8.8) subject to the bit-rate condition R ≥ R1 , if there
exist three positive definite matrices P̄ > 0, Q̄ > 0, R̄ > 0 and a real-valued matrix
X such that the condition
0
4̄11 4̄12 BX 4̄15
2 1¯ ¯ 25
∗
− ι R̄ ι R 0 4
0 0 <0 (8.28)
5= ∗ ∗ 4̄33
∗ ∗ ∗ −µ2 R̄ 4̄45
∗ ∗ ∗ ∗ 4̄55
holds, where
1¯ 1¯
4̄11 = αP̄ + Q̄ − R + P̄AT + AP̄, 4̄12 = BX + R ,
ι ι
p p
4̄15 = β P̄AT , 4¯ 25 = β XT BT ,
1 1
1 p
¯ 33 = − R̄ − β0 Q̄, 4̄45 = − β XT BT ,
4 1
ι
eαι − 1
¯ 55 = R̄ − 2P̄, β0 = e−αι , β1 =
4 .
α
V1 (t) = xT (t)Px(t),
Z t
V2 (t) = eα(s−t) xT (s)Qx(s)ds,
t−ι
Z 0 Z t
V3 (t) = e−αθ eα(s−t) x˙ T (s)Rx˙(s)dsdθ.
−ι t+θ
Along the trajectory of (8.27), taking the derivative of V(t) with respect to the time
t results in
V̇(t) = V̇1 (t) + V̇2 (t) + V̇3 (t) (8.30)
where
1
≤− (x(t) − x(t − d(t))T R(x(t) − x(t − d(t))
d(t)
(8.32)
1
− (x(t − d(t) − x(t − ι))T R
ι − d(t)
× (x(t − d(t) − x(t − ι))
1
≤ − (x(t) − x(t − d(t)))T R(x(t) − x(t − d(t))
ι
1
− (x(t − d(t)) − x(t − ι))T R(x(t − d(t)) − x(t − ι)).
ι
An Event-Triggered Encoding Approach 179
where
p
4 = 41 + 4T2 R42 , 42 = β 1 [A BK 0 −BK],
411 PBK + 1ι R
0 −PBK
∗ − 2ι R 1
ιR 0 ,
41 = 1
∗ ∗ − ι R − β0 Q 0
∗ ∗ ∗ −µ2 R
ξ(t) = [xT (t) xT (t − d(t)) xT (t − ι) x̃Td (t − d(t))]T ,
1
411 = αP + Q − R + AT P + PA,
ι
1
kx̃d (t − d(t))kR = (x̃dT (t − d(t))Rx̃d (t − d(t))) 2 .
In order to draw the main results, we are in a position to show that 4 < 0 under the
condition (8.28). First, noting that P−1 RP−T −2P−1 ≥ −R−1 , it follows from (8.28)
that 5̄ < 0, where 5̄ has the same structure with 5 and only R̄ − 2P̄ is replaced by
−R−1 . Then, pre-multiplying and post-multiplying 5̄ by diag{P, P, P, P, I} and its
transpose, one has
41 4T2
< 0. (8.34)
∗ −R−1
Using the Schur Complement Lemma to the inequality (8.34), it immediately finds
that 4 < 0. Moreover, considering that both the observation error and decoding error
2 ≤
satisfy kx̃a (t)k = kx̃d (t)k ≤ σ0 eλ1 τ e−λt , it is obvious that µ2 kx̃d (t − d(t))kR
2 2 2
h̄(t), where h̄(t) = µ λmax (R)σ0 e 1 e λ τ − 2λ(t−ι) . Consequently, it is inferred from
(8.33) that
Then, according to the fact that V(t) ≥ λmin (P) and h̄(t) ≤ h̄(t0 ), one further has
s Rt
e−αt V(0) 0 e−α(t−θ ) h¯ (θ)dθ
kx(t)k ≤ +
λmin (P) λmin (P)
s
e−αt V(0) 1 − e−αt
≤ + h(t
¯ 0) (8.37)
λmin (P) αλmin (P)
s
e−αt V(0) 1
≤ + h(t
¯ 0 ).
λmin (P) αλmin (P)
20
Amplitude
0
x a1 (t)
−20 x d1 (t)
−40
0 5 10 15 20 25 30
Time(s)
20
x a2 (t)
10 x d2 (t)
Amplitude
−10
−20
0 5 10 15 20 25 30
Time(s)
FIGURE 8.2
Dynamical evolutions of auxiliary system and decoder.
182 Data-Rate-Constrained State Estimation and Control
25
x̃ a1 (t)
20
x̃ a2 (t)
15
10
Amplitude
−5
−10
−15
0 5 10 15 20 25 30
Time(s)
FIGURE 8.3
The decoding errors between the actual system states and their decoded values.
0.8
x 1 (t)
0.7
Amplitude
0.6
0.5
0.4
0 5 10 15 20 25 30
Time(s)
−0.5
−0.6 x 2 (t)
Amplitude
−0.7
−0.8
−0.9
0 5 10 15 20 25 30
Time(s)
FIGURE 8.4
State response without control signal u(t).
An Event-Triggered Encoding Approach 183
40
x 1 (t)
Amplitude
20
−20
0 5 10 15 20 25 30
Time(s)
10
Amplitude
0
x 2 (t)
−10
−20
0 5 10 15 20 25 30
Time(s)
FIGURE 8.5
State response with control signal u(t).
50
45
40
35
30
Amplitude
25
20
15
10
0
0 5 10 15 20 25 30
Time(s)
FIGURE 8.6
The threshold of the event generation function and the norm of x̃a (t).
184 Data-Rate-Constrained State Estimation and Control
depicts the dynamics of the auxiliary system state xa (t) and the decoder
state xd (t). Figure 8.3 describes the decoding error between the system state
x(t) and its decoded value xd (t). Figure 8.4 plots the state trajectory of the
open-loop system, while Figure 8.5 gives the state response of the closed-
loop system with control input u(t). Figure 8.6 illustrates the evolution of
the event generation function σ (t) and the triggering instants. It is inferred
from Figures 8.2–8.3 that the decoding error converges to zero as time goes to
infinity and hence the developed coding strategy works well. Figures 8.4–8.5
show that the proposed control scheme is effective for the unstable systems.
From Figure 8.6, it is not difficult to see that the intersections of the two curves
are the triggering instants. Consequently, all the simulation results confirm
the superiority of the proposed control policy.
8.8 Summary
In this paper, the event-triggered control issue has been considered for a class
of continuous-time linear systems via the digital communication channel.
A novel digital data transmission mechanism has been introduced, where the
communication media has been subjected to limited transmission capacity.
A difference coding scheme has been developed, which has transferred the
original information to one-bit symbolic data. In addition, a unified event-
based encoding and sampling mechanism has been proposed in order to
alleviate the communication burden as well as the equipment losses. The
“Zeno” behavior has been excluded by determining a lower bound of the
inter-event execution times. A sufficient condition of the required bit rate has
been obtained to guarantee the convergence of the decoding error. Moreover,
a necessary condition has also been derived with the bit rate below which
the decoding error diverges. By obtaining the decoded data, the input-delay
method has been adopted to deal with both the analysis and the design of the
addressed control problem. Finally, the effectiveness of our coding/control
strategies has been well verified by a simulation example.
9
Event-Based State Estimation under
Constrained Bit Rate: An
Encoding-Decoding Approach
where x(t) ∈ Rn is the state vector and w(t) ∈ Rp is the bounded disturbance
input satisfying kw(t)k ≤ w̄ with w̄ being a known positive scalar. A and B
are known matrices with appropriate dimensions.
The measurement model is given as follows:
where ya (t) is the estimate of y(t) whose dynamics shall be given later and
σ (t) is the exponential decay function defined as
σ (t) , σ0 e−λt + ̺.
where ỹai (t) (i = 1, 2, . . . , m) is the i-th component of ỹa (t). In what follows,
we slightly abuse the notation θi (sk ) to denote the encoded signal θi ỹai (sk ) .
Furthermore, we assume that θi (sk ) will not be sent to the decoder side if
y˜ ai (sk ) = 0.
In the sequel, we aim to characterize the dynamics of the measurement
output y(t) by using the following assumption and lemmas.
C = U CV T (9.6)
Lemma 9.2: For a given matrix A ∈ Rn×n and a given matrix C ∈ Rm×n of full-
row rank, there exists a matrix
Proof: The proof of this lemma is easily accessible from Lemma 9.1 and is therefore
omitted.
Lemma 9.3: The dynamic evolution of the measurement output y(t) is governed by
the differential equation
where
G , CB −ZD D
T
ξ(t) , wT (t) vT (t) v̇T (t) .
Remark 9.1: Inspired by [89, 90], in this paper, we make the first attempt to
deal with the state estimation problem under the sign-information-based encoding-
decoding scheme. Note that, since the measurement matrix C is generally non-
invertible, there is a substantial difficulty in characterizing the dynamic evolution
of y(t) by means of a differential equation. To overcome such an intrinsic difficulty,
the singular value decomposition technique is applied to the measurement matrix
C, which plays a vital role in deriving the dynamic evolution of y(t) under certain
assumptions. In addition, the establishment of equation (9.8) facilitates, to a great
extent, the subsequent encoder/decoder analysis and synthesis.
T
Here, θ(sk ) , θ1 (sk ) θ2 (sk ) . . . θm (sk ) , σ (sk ) , σ0 e−λsk +̺ and s+
k stands
+
for the right limit of the triggering instant sk , namely, sk , limǫ>0,ǫ→0 {sk + ǫ}.
Similar to the results in [81–83], the auxiliary system (9.9) is a kind of hybrid
systems where sk can be viewed as the impulsive sequence determined by
the event function (9.4).
190 Data-Rate-Constrained State Estimation and Control
According to Lemma 9.2 and (9.9), the dynamics of ỹa (t) is derived as
ỹ˙ (t) = Zỹa (t) + Gξ(t), t ∈ [sk , sk+1 )
a
1
ỹa (sk+ ) = ỹa (sk ) − θ(sk )σ (sk ) (9.10)
m
ỹa (0) = y0 , t = 0
Encoder
FIGURE 9.1
Schematic of state estimation problem under constrained bit rate.
where
Ā , A − KC
B̄ , [B −KD K]
ϑ(t) , [wT (t) vT (t) ỹTd (t)]T .
ξ¯ kGk
ζ1 + < 1,
̺
sk+1 − sk ≥ δ
where
ξ̄ kGk
− ln ζ1 + ̺
δ, , ξ¯ , w̄ + v¯ + ν̄
kZk + λ¯
r
1
λ̄ , max{λ, 1}, ζ1 , 1− .
m
Proof: Let us first focus our attention on the dynamics evolution of ỹa (t) over the
time interval [sk , sk+1 ). Based on (9.10), ỹa (t) is calculated as
Z t
Z(t−sk )
ỹa (t) = e ỹa (s+
k )+eZ(t−s) Gξ(s)ds
sk
Z(t−sk ) 1
=e ỹa (sk ) − θ(sk )σ (sk ) (9.15)
m
Z t
+ eZ(t−s) Gξ(s)ds.
sk
n o
σi (sk )
Setting σi (sk ) , |yi (sk ) − yai (sk )| (i = 1, 2, . . . , m) and 6(sk ) , diagm σ (sk ) ,
together with the definition of θ (sk ), we rewrite ỹa (sk ) as
which results in
1
ỹa (t) = eZ(t−sk ) 6(sk ) − Im θ(sk )σ (sk )
m
Z t (9.16)
+ eZ(t−s) Gξ(s)ds.
sk
Event-Based State Estimation under Constrained Bit Rate 193
By applying some algebraic manipulations, the second term in the right-hand side of
(9.16) can be further reduced to
Z t−sk
"Z
t−sk TZ t−sk # 12
eZs Gξ(t − s)ds = Zs
e Gξ(t − s)ds eZs Gξ(t − s) ds
0 0 0
Z t−sk T 12
Zs Zs
≤ (t − sk ) e Gξ(t − s) e Gξ(t − s) ds
0
Z t−sk 12
2
Zs
= (t − sk ) e Gξ(t − s) ds
0
1 2
≤ (t − sk ) 2 (t − sk ) eZ(t−sk ) kGk2
n o 12
2
× max kξ(t − s)k
s∈[0, t−sk ]
1
6(sk ) − Im θ (sk )
m
v
u m 2
uX θi (sk )
2 2σi (sk )σ (sk ) σ 2 (sk )
= t σ (sk ) − +
σ 2 (sk ) i m m2 (9.19)
i=1
v
u m 2
uX θi (sk )σi2 (sk ) m
X θi2 (sk )σi (sk ) Xm
θi2 (sk )
=t − 2 + .
σ 2 (sk ) mσ (sk ) m2
i=1 i=1 i=1
m
θ 2 (sk )σ 2 (sk ) 2
Pm
X
i i i=1 σi (sk ) σ 2 (sk )
= = =1
σ 2 (s k) σ 2 (sk ) σ 2 (sk )
i=1
and
σ1 (sk ) + σ2 (sk ) + · · · + σm (sk ) √
1≤ ≤ m. (9.20)
σ (sk )
√
1
m
X θi2 (sk )σi (sk ) m
≤ ≤ ,
m mσ (sk ) m
i=1
which yields
√
2 m
m
X θi2 (sk )σi (sk ) 2
− ≤ −2 ≤− .
m mσ (sk ) m
i=1
Consequently, in accordance with the above analysis, we draw the conclusion that
1
ζ0 ≤ 6(sk ) − Im θ (sk ) ≤ ζ1 (9.21)
m
where
s
√ r
2 m 1 1
ζ0 , 1− + 2, ζ1 , 1− .
m m m
Event-Based State Estimation under Constrained Bit Rate 195
σ (sk ) = σ0 e−λsk + ̺
= σ0 eλ(t−sk ) e−λt + ̺
≤ eλ(t−sk ) (σ0 e−λt + ̺)
= eλ(t−sk ) σ (t).
¯ ∗ −s ξ¯ kGk (kZk+λ)(
¯ t∗ −sk )
1 − ζ1 e(kZk+λ)(t k) < e , (9.25)
̺
¯ ∗ −s 1
e(kZk+λ)(t k) > . (9.26)
ξ¯ kGk
ζ1 + ̺
1
ln ¯
ζ1 + ξ kGk
̺
t∗ − sk > , δ, (9.27)
kZk + λ̄
196 Data-Rate-Constrained State Estimation and Control
Therefore, the Zeno behavior is eliminated and the proof of this lemma is ended.
we know that the boundedness of ỹd (t) is equivalent to that of ỹa (t). Then,
we can infer from (9.22)–(9.23) that
Hence, we have
which implies that the decoding error ỹd (t) is ultimately bounded.
Theorem 9.1: Under the event-based encoding-decoding scheme (9.4), (9.5) and
(9.11), the decoding error ỹd (t) is ultimately bounded if the bit rate R of the
communication channel satisfies
m
R ≥ R0 , .
δ
Proof: It follows from the boundedness analysis of ỹd (t) that the decoding error is
ultimately bounded under the event-based encoding-decoding scheme (9.4), (9.5) and
(9.11).
Event-Based State Estimation under Constrained Bit Rate 197
Next, the encoding rule (9.5) indicates that, at each triggering instant sk ,
only one bit data is transmitted for each measurement component yi (t) (i = 1,
2, . . . , m), and thus m-bits data are required for y(t) during each data
transmission.
Now, based on Lemma 9.4, the required bit rate is mδ for the sake of guaranteeing
the boundedness of the decoding error. The proof is complete.
Lemma 9.5: Under the event-based encoding-decoding scheme (9.4), (9.5) and
(9.11), the decoding error is divergent if the bit rate of the communication channel
dξ̄ kGk
m ln (ζ0 χ)−ln
is less than R1 , namely, R < R1 , where R1 , δ1 , δ1 , 1
̺
, a is the
d +kZk−a
smallest real part of the eigenvalues of Z, d is a positive scalar and other parameters
are defined in Lemma 9.4.
Proof: The main idea of deriving the bit rate R1 is to seek an upper bound of the
time interval between two successive triggering instants. To proceed further, we first
give the following assertion.
Assertion: For the matrix Z ∈ Rm×m , there exists a positive real constant
ς > 0 and a positive-definite matrix P ∈ Rm×m such that the following inequality
holds
where χ , λmin {PT P}λmin {P−T P−1 }ς and a is the smallest real part of the
eigenvalues of Z.
198 Data-Rate-Constrained State Estimation and Control
In what follows, we aim to prove the matrix inequality (9.28). To begin with, let
us recall some properties of the matrix transformation.
Letting the matrix Z has r (r ≤ m) different eigenvalues λ1 , λ2 , . . . , λr , the
characteristic polynomial of Z is written as
li ≤ mi , ∀i ∈ {1, 2, . . . , r},
which indicates l ≤ m.
In terms of the theory of linear algebra, there exists a non-singular matrix P ∈
Rm×m such that
P−1 ZP = J
which indicates
−1 ZP
eZ(t−sk ) = Pe(t−sk )P P−1
= P diag{e(t−sk )J1 , e(t−sk )J2 , . . . , e(t−sk )Jl }P−1 .
Ji = λs I + Ji (0)
and
With the help of (9.21), (9.28) and the Jensen inequality, one further
calculates
Z t
a(t−sk )
ky(t) − ya (t)k ≥ ζ0 χ e σ (sk ) − eZ(t−s) Gξ(s)ds
sk
where the first inequality comes from (9.18) and the second inequality is
based on the facts
σ (sk ) ≥ σ (t)
t−sk
(t − sk ) ≤ de d (9.33)
̺ ≤ σ (t)
with d > 0.
Letting
a(t−sk ) dξ¯ kGk ( 1 +kZk)(t−sk )
ζ0 χ e − e d = 1,
̺
Event-Based State Estimation under Constrained Bit Rate 201
we can obtain
as long as
dξ¯ kGk
ζ0 χ − > 0.
̺
sk+1 − sk ≤ δ1 .
m
R < R1 , .
δ1
Remark 9.3: Except for the sufficient condition on the required bit rate R0 obtained
from Theorem 9.1, we further derive a bit rate condition R1 in Lemma 9.5,
whose theoretical and practical significance lies in that 1) a necessary condition
is established for the bit-rate-constrained state estimation problem, namely, below
which the estimation error would be divergent; 2) a lower bound of the bandwidth
requirement on the allocation of the network resource is given; and 3) a new
performance index 1R , R0 − R1 is provided to evaluate the conservativeness of
the sufficient condition in Theorem 9.1. To be more specific, the smaller the 1R, the
less the conservativeness of the bit rate condition in Theorem 9.1. For the extreme case
1R = 0, the sufficient condition in Theorem 1 becomes the necessary and sufficient
condition. Therefore, in terms of the bit rates R0 and R1 , a more accurate relationship
between the estimation performance and the communication resource is established,
which is of both theoretical significance and practical importance.
Theorem 9.2: Let the bit rate of the communication network satisfy R ≥ R0 . The
error dynamics (9.14) of the state estimation is ultimately bounded under the event-
based encoding-decoding scheme (9.4), (9.5) and (9.11) if there exist positive scalars
α, γ , a positive definite matrix Q and a matrix K̄ satisfying
ĀT Q + QA¯ + αQ Q̄
4, <0 (9.34)
∗ −γ I
where
K = Q−1 K̄
and the ultimate upper bound of the estimation error kx̃(t)k is calculated as
s
γ ϑ̄ T ϑ̄
αλmin {Q}
with
ϑ̄ , [w̄ v̄ σ0 + ̺]T .
Proof: It is known from subsection 9.2.2 that the boundedness of the decoding error
ỹd (t) can be guaranteed under the bit rate condition R ≥ R0 , which implies that the
vector ϑ(t) is bounded.
Construct the Lyapunov function as follows:
Then, the derivative of V(t) along the trajectory of the estimation error dynamics
(9.14) can be calculated as
As such, we have
Z t
−αt
V (t) ≤ e V (0) + γ e−α(t−s) ϑ T (s)ϑ(s)ds
0
γ
≤ e−αt V(0) + (1 − e−αt )ϑ̄ T ϑ̄,
α
and is therefore exponentially bounded. Accordingly, the ultimate upper bound can
be expressed by s
γ ϑ̄ T ϑ̄
αλmin {Q}
and the proof of this theorem is complete.
Remark 9.4: It follows from subsection 9.2.2 that the decoding error ỹd (t)
asymptotically tends to ̺. Based on this fact, we have
¯ 2 + v̄2 + ̺)
Z t ϑ T (t)ϑ(t) (w
lim e−α(t−s) ϑ T (s)ϑ(s)ds ≤ lim ≤ ,
t→∞ 0 t→∞ α α
which means that, when the time t tends to infinity, a tighter upper bound of the
estimation error is obtained as
s
γ (w̄2 + v̄2 + ̺)
.
αλmin {Q}
Remark 9.5: Till now, a systematic study has been conducted on the encoding-
decoding-based state estimation problem for a class of continuous-time systems
under a bit-rate constrained network. The emphasis is placed on the research with
respect to the joint design issue of encoder/decoder/estimator. To be more specific,
in Lemma 9.4, the unexpected Zeno phenomenon has been excluded in order to
ensure the normal operation of the designed event-based encoder. In Theorem 9.1,
a sufficient condition has been first established to guarantee the boundedness of
the decoding error. Then, in Lemma 9.5, a necessary condition has been given to
204 Data-Rate-Constrained State Estimation and Control
illustrate that the decoding error would be divergent when the bit rate is below a
given condition. Furthermore, Theorem 9.2 has provided a sufficient condition to
ensure the exponential boundedness of the estimation errors on the premise of the
convergence of the decoding errors.
Remark 9.6: Comparing with existing literature, the main novelties of our current
results lie in that: 1) the research problem addressed is new that represents the first
attempt to investigate the event-based encoding-decoding state estimation problem
under bit rate constraints; 2) the dynamical evolution of the measurement output
is proposed with the help of the singular value decomposition technique that offers
a better performance for the developed sign-information-based encoding-decoding
scheme; and 3) the derived bit rate condition is viewed as a bridge to establish the
tight connection among the network resources and the decoding errors as well as the
estimation performance.
The eigenvalues of A are 0.8 and −0.1667, which indicate that system (9.1) is
unstable and it is therefore non-trivial to verify the developed estimation scheme on
this system.
By applying the singular value decomposition technique to matrix C, U, C0 and
V, one can obtain
U = 1, C0 = 0.8544
0.9363 −0.3511
V=
0.3511 0.9363
V1 = [0.9363 0.3511]T
V2 = [−0.3511 −0.9363]T ,
Event-Based State Estimation under Constrained Bit Rate 205
K = [2.3726 2.1875].
According to Theorem 9.1, the required bit rate to achieve the ultimate boundedness
of the estimation error is R = 0.6034 bits/second.
The simulation results are shown in Figures 9.2-9.6. The measurement output
y(t) and its decoded value are illustrated in Figure 9.2, and the corresponding
decoding error is depicted in Figure 9.3. The system states xi (t) (i = 1, 2) and
their estimations are described in Figure 9.4. The estimation errors are shown in
Figure 9.5. In Figure 9.6, the dynamics of the triggering function ky(t) − ya (t)k and
the corresponding threshold are given, from which it is observed that the x-axis of
the intersection point of the two curves is the triggering instants. All the simulation
results have confirmed the validity of the proposed encoding/estimation method.
250
200
150
100
50
0
0 1 2 3 4 5 6 7 8
FIGURE 9.2
Measurement y(t) and its decoded value yd (t).
206 Data-Rate-Constrained State Estimation and Control
6
The norm of the decoding error
0
0 5 10 15 20 25 30 35 40
time
FIGURE 9.3
The norm of the decoding error ỹd (t).
State strategies and their
1000
800
estimates
600
400
200
0
0 1 2 3 4 5 6 7 8 9 10
time
1500
State strategies and their
estimates
1000
500
0
0 1 2 3 4 5 6 7 8 9 10
time
FIGURE 9.4
The state trajectories xi (t) and their estimates x̂i (t) (i = 1, 2).
Event-Based State Estimation under Constrained Bit Rate 207
6
The estimation errors
0
0 5 10 15 20 25 30 35 40
time
8
The estimation errors
0
0 5 10 15 20 25 30 35 40
time
FIGURE 9.5
The estimation errors x̃i (t) (i = 1, 2).
12
10
Triggering threshold and the
norm of the decoding error
0
0 5 10 15 20 25 30 35 40
time
FIGURE 9.6
Triggering threshold σ (t) and the norm of the decoding error kỹd (t)k.
208 Data-Rate-Constrained State Estimation and Control
where x1 (t), x2 (t) and x3 (t) stand for, respectively, the position, the velocity and the
acceleration of the target. In this case, the matrices A and B are
0 1 0
A = 0 0 1 , B = 0.1 0.1 0 .
0 0 0
Let u(t) = 0 and the other parameters are set the same as the ones in Example 9.1.
By solving the linear matrix inequality in Theorem 9.2, the estimator gain matrix is
given by
11.0827 −0.7379
K = 3.7083 1.3152 .
0.1407 0.1326
It is calculated that V1T AV2 = [0 0.0099] and thus the equality constraint
in Lemma 9.2 is considered to be met. The initial conditions are set as
x(0) = [0.2 0 −0.15]T , x̂(0) = [0 0 0]T , y(0) = Cx(0) and ya (0) =
yd (0) = [0.5 0]T . As expected, it is observed from Figures 9.7–9.8 that simulation
results well confirm the validity of the proposed estimation scheme. Moreover, in
order to examine the impact of the intensity of the disturbances w(t) and v(t) and
the triggering threshold ̺ on the bit-rate condition, some comparisons are made as
shown in Tables 9.1 and 9.2. It is can be concluded from Tables 9.1 and 9.2 that: 1)
the severer the intensities of the disturbances w(t) and v(t) are, the larger bit rate of
the communication channel is required and 2) the larger the triggering threshold ̺
is, the smaller the required bit rate would be. These comparison results are consistent
with the theoretical analysis.
Event-Based State Estimation under Constrained Bit Rate 209
-1000
-2000
0 50 100 150
Time
The state trajectories
and their estimates
-10
-20
0 50 100 150
Time
The state trajectories
and their estimates
0
-0.2
-0.4
-0.6
0 50 100 150
Time
FIGURE 9.7
The state trajectories xi (t) (i = 1, 2, 3) and their estimates.
The estimation errors
50
0
0 50 100 150
Time
The estimation errors
10
0
0 50 100 150
Time
The estimation errors
0.5
0
0 50 100 150
Time
FIGURE 9.8
The estimation errors x̃i (t) (i = 1, 2, 3).
210 Data-Rate-Constrained State Estimation and Control
TABLE 9.1
Bit Rate R0 Under Different Threshold Values ̺
TABLE 9.2
Bit Rate R0 Under Different Disturbance Intensities
9.4 Summary
In this paper, the state estimation problem has been investigated for a class of
NSs under bit rate constraints. The measurement outputs have been encoded
into the binary codeword with 1 bit and then transmitted to the estimator via
a digital communication channel. For the resource-saving purpose, an event-
triggered coding-decoding mechanism has been employed in the process
of data encoding/transmission. A bit rate condition has been established
to guarantee the ultimate boundedness of both the decoding error and the
estimation error. Furthermore, the desired estimator gain has been acquired
in terms of the solution to a matrix inequality. Finally, a numerical simulation
has been proposed to demonstrate the validity of the main results.
10
Conclusions and Future Topics
In this book, the control and state estimation problems have been thoroughly
investigated for networked systems under a data-rate-constrained network
environment. Latest results on data-rate-constrained control and state
estimation issues have been first surveyed under different types of encoding-
decoding schemes and bandwidth constraints originating from real-world
engineering practice. Then, in each chapter, regarding the addressed
control and state estimation/filtering with data rate constraint, various
encoding-decoding strategies have been developed. Meanwhile, a set of
sufficient conditions have been established for designed encoding-decoding
strategies to achieve certain pre-specified system performances including
minimum variance specification, uniform boundedness index, consensus
and synchronization requirements. Subsequently, both numerical and
practical illustrative demonstrations have been presented that are capable
of verifying the feasibility and efficacy of all developed data-constrained
control/state estimation approaches.
This book has established a unified theoretical framework for the
synthesis/analysis problems for networked systems with constrained
network bandwidth. A great variety of engineering-oriented data rate
constraints and corresponding encoding-decoding schemes have been taken
into account in a systematical yet effective procedure. It is worth mentioning
that the acquired results are still quite limited, and some concluding remarks
and prospective topics are highlighted as follows:
(1) Channel Encoding. So far, most of the existing results focus their
attention on the aspect of source encoding and decoding. In fact, the
channel encoding-decoding is also very important for the reliability
of the data transmission in the communication network. Therefore,
it is quite meaningful to study the co-design issue of the source and
channel encoding-decoding in NSs.
(2) Combining with Other Communication Protocols. Recently, some effec-
tive data scheduling strategies such as the Round-Robin protocol, the
Try-Once-Discard protocol, the stochastic protocol, etc., have been
successfully applied to the NSs in order to cope with the limited
communication resources. For the purpose of making full use of the
213
214 Bibliography
[47] N. Hou, H. Dong, Z. Wang, W. Ren, and F. E. Alsaadi, H∞ state estimation for
discrete-time neural networks with distributed delays and randomly occurring
uncertainties through fading channels, Neural Networks, vol. 89, pp. 61–73, 2017.
[48] C. Hu and H. Jiang, Pinning synchronization for directed networks with node
balance via adaptive intermittent control, Nonlinear Dynamics, vol. 80, nos. 1–2,
pp. 295–307, 2015.
[49] J. Hu, Z. Wang, and H. Gao, Recursive filtering with random parameter
matrices, multiple fading measurements and correlated noises, Automatica,
vol. 49, no. 11, pp. 3440–3448, 2013.
[50] L. Hu, Z. Wang, Q.-L. Han, and X. Liu, State estimation under false data
injection attacks: Security analysis and system protection, Automatica, vol. 219,
pp. 176–183, 2018.
[51] L. Hu, Z. Wang, Q.-L. Han, and X. Liu, Event-based input and state estimation
for linear discrete time-varying systems, International Journal of Control, vol. 91,
no. 1, pp. 101–113, 2018.
[52] J. Hu, Z. Wang, S. Liu, and H. Gao, A variance-constrained approach to
recursive state estimation for time-varying complex networks with missing
measurements, Automatica, vol. 64, pp. 155–162, 2016.
[53] H. Ishii and B. A. Francis, Quadratic stabilization of sampled-data systems with
quantization, Automatica, vol. 39, no. 10, pp. 1793–1800, 2013.
[54] H. Ishii and S. Hara, A subband coding approach to control under limited data
rates and message losses, Automatica, vol. 44, no. 4, pp. 1141–1148, 2008.
[55] A. Isidori, L. Marconi, and C. de Persis, Remote tracking via encoded
information for nonlinear systems, Systems & Control Letters, vol. 55, no. 10,
pp. 809–818, 2006.
[56] Y. Isidori, K. Takaba, and D. E. Quevedo, Stability analysis of networked control
systems subject to packet-dropouts and finite-level quantization, Systems &
Control Letters, vol. 60, no. 5, pp. 325–332, 2011.
[57] X.-W. Jiang, B. Hu, Z.-H. Guan, X.-H. Zhang, and L. Yu, Best achievable tracking
performance for networked control systems with encoder-decoder, Information
Sciences, vol. 305, pp. 184–195, 2015.
[58] Z. Jiang and Y. Wang, Input-to-state stability for discrete-time nonlinear
systems, Automatica, vol. 37, no. 6, pp. 857–869, 2001.
[59] Z. Jin, V. Gupta, and R. M. Murray, State estimation over packet dropping
networks using multiple description coding, Automatica, vol. 42, no. 9,
pp. 1141–1152, 2006.
[60] D. Kapetanovic, S. Chatzinotas, and B. Ottersten, Index assignment for
multiple description repair in distributed storage systems, in Proceedings of the
2014 IEEE International Conference on Communications, pp. 3896–3901, Sydney,
NSW, Australia, Jun. 10–14, 2014.
[61] M. J. Khojasteh, P. Tallapragada, J. Cortes, and M. Franceschetti, The value of
timing information in event-triggered control: The scalar case, in Proceedings of
the 54th Annual Allerton Conference on Communication, Control, and Computing,
pp. 1165–1172, Monticello, IL, USA, Sept. 27–30, 2016.
[62] M. J. Khojasteh, P. Tallapragada, J. Cortes, and M. Franceschetti, Time-
triggering versus event-triggering control over communication channels, in
Proceedings of the 2017 IEEE 56th Annual Conference on Decision and Control,
Melbourne, VIC, Australia, 2017.
Bibliography 217
[78] T. Li and L. Xie, Distributed consensus over digital networks with limited
bandwidth and time-varying topologies, Automatica, vol. 47, no. 9, pp. 2006–
2015, 2011.
[79] T. Li and L. Xie, Distributed coordination of multi-agent systems with
quantized-observer based encoding-decoding, IEEE Transactions on Automatic
Control, vol. 57, no. 12, pp. 3023–3037, 2012.
[80] X. Li, C. Li, and M. Z. Q. Chen, Stabilisation of non-linear DISS systems with
uncertainty via encoded feedback, IET Control Theory & Applications, vol. 11,
no. 5, pp. 732–739, 2017.
[81] X. Li, Y. Yu, and L. Guo, Stability of time-delay systems with impulsive control
involving stabilizing delays, Automatica, vol. 124, Art. No. 109336, 2021.
[82] X. Li, D. Peng, and J. Cao, Lyapunov stability for impulsive systems via event-
triggered impulsive control, IEEE Transactions on Automatic Control, vol. 65,
no. 11, pp. 4908–4913, 2020.
[83] X. Li, T. Zhang, and J. Wang, Input-to-state stability of impulsive systems via
event-triggered impulsive control, IEEE Transactions on Cybernetics, vol. 52,
no. 7, pp. 7187–7195, 2022.
[84] Z. Li, Z. Duan, and G. Chen, Consensus of discrete-time linear multi-
agent systems with observer-type protocols, Discrete and Continuous Dynamical
Systems-Series B, vol. 16, no. 2, pp. 489–505, 2011.
[85] D. Liberzon, On stabilization of linear systems with limited information, IEEE
Transactions on Automatic Control, vol. 48, no. 2, pp. 304–307, 2003.
[86] D. Liberzon, Hybrid feedback stabilization of systems with quantized signals,
Automatica, vol. 39, no. 3, pp. 1543–1554, 2003.
[87] D. Liberzon and J. P. Hespanha, Stabilization of nonlinear systems with limited
information feedback, IEEE Transactions on Automatic Control, vol. 50, no. 6,
pp. 910–915, 2005.
[88] N. Lin and Q. Ling, Bit-rate conditions for the consensus of quantized
multiagent systems based on event triggering, IEEE Transactions on Cybernetics,
vol. 52, no. 1, pp. 116–127, 2022.
[89] Q. Ling, Bit rate conditions to stabilize a continuous-time scalar linear system
based on event triggering, IEEE Transactions on Automatic Control, vol. 62, no. 8,
pp. 4093–4100, 2017.
[90] Q. Ling, Bit-rate conditions to stabilize a continuous-time linear system with
feedback dropouts, IEEE Transactions on Automatic Control, vol. 63, no. 7,
pp. 2176–2183, 2018.
[91] G. Liu, H. Liu, H. Chen, C. Zhou, and L. Shu, Position-based adaptive
quantization for target location estimation in wireless sensor networks using
one-bit data, Wireless Communications & Mobile Computing, vol. 16, no. 8,
pp. 929–941, 2016.
[92] Q. Liu and J. Fan, State estimation for networked control systems using fixed
data rates, International Journal of Systems Science, vol. 48, no. 9, pp. 1818–1828,
2017.
[93] S. Liu, T. Li, and L. Xie, Distributed consensus for multiagent systems with
communication delays and limited data rate, SIAM Journal on Control and
Optimization, vol. 49, no. 6, pp. 2239–2262, 2011.
[94] S. Liu, T. Li, L. Xie, M. Fu, and J. Zhang, Continuous-time and sampled-
data-based average consensus with logarithmic quantizers, Automatica, vol. 49,
no. 11, pp. 3329–3336, Nov. 2013.
Bibliography 219
[95] S. Liu, Y. Song, D. Ding, and Y. Liu, Event-triggered dynamic output feedback
RMPC for polytopic systems with redundant channels: Input-to-state stability,
Journal of the Franklin Institute-Engineering and Applied Mathematics, vol. 354,
no. 7, pp. 2871–2892, 2017.
[96] S. Liu, Y. Song, G. Wei, and X. Huang, RMPC-based security problem
for polytopic uncertain system subject to deception attacks and persistent
disturbances, IET Control Theory & Applications, vol. 11, no. 10, pp. 1611–1618,
2017.
[97] S. Liu, Z. Wang, Y. Chen, and G. Wei, Protocol-based unscented Kalman
filtering in the presence of stochastic uncertainties, IEEE Transactions on
Automatic Control, vol. 65, no. 3, pp. 1303–1309, 2020.
[98] S. Liu, Z. Wang, B. Shen, and G. Wei, Partial-neurons-based state estimation
for delayed neural networks with state-dependent noises under redundant
channels, Information Sciences, vol. 547, pp. 931–944, 2021.
[99] S. Liu, Z. Wang, G. Wei, and M. Li, Distributed set-membership filtering for
multirate systems under the Round-Robin scheduling over sensor networks,
IEEE Transactions on Cybernetics, vol. 50, no. 5, pp. 1910–1920, 2020.
[100] S. Liu, G. Wei, Y. Song, and Y. Liu, Extended Kalman filtering for stochastic
nonlinear systems with randomly occurring cyber attacks, Neurocomputing,
vol. 207, pp. 708–716, 2016.
[101] W. Liu, Z. Wang, and N. Mingkang, Controlled synchronization for chaotic
systems via limited information with data packet dropout, Automatica, vol. 49,
no. 11, pp. 3329–3336, 2013.
[102] H. Liu, Z. Wang, B. Shen, and X. Liu, Event-triggered H∞ state estimation for
delayed stochastic memristive neural networks with missing measurements:
The discrete time case, IEEE Transactions on Neural Networks and Learning
Systems, vol. 29, no. 8, pp. 3726–3737, 2018.
[103] H. Liu, Z. Wang, B. Shen, and F. E. Alsaadi, H∞ state estimation for
discrete-time memristive recurrent neural networks with stochastic time-
delays, International Journal of General Systems, vol. 45, no. 5, pp. 633–647, 2016.
[104] M. B. Loiola, R. R. Lopes, and J. M. T. Romano, Modified Kalman filters for
channel estimation in orthogonal space-time coded systems, IEEE Transactions
on Automatic Control, vol. 60, no. 1, pp. 533–538, 2012.
[105] J. Lu, D. W. C. Ho, and Z. Wang, Pinning stabilization of linearly coupled
stochastic neural networks via minimum number of controllers, IEEE
Transactions on Neural Networks, vol. 20, no. 10, pp. 1617–1629, 2009.
[106] Y. Luo, Z. Wang, G. Wei, and F. E. Alsaadi, Robust H∞ filtering for a class
of two-dimensional uncertain fuzzy systems with randomly occurring mixed
delays, IEEE Transactions on Fuzzy Systems, vol. 25, no. 1, pp. 70–83, 2017.
[107] Y. Luo, Z. Wang, G. Wei, F. E. Alsaadi, and T. Hayat, State estimation for a class
of artificial neural networks with stochastically corrupted measurements under
Round-Robin protocol, Neural Networks, vol. 77, pp. 70–79, 2016.
[108] L. Ma, Z. Wang, Q.-L. Han, and H. K. Lam, Variance-constrained distributed
filtering for time-varying systems with multiplicative noises and deception
attacks over sensor networks, IEEE Sensors Journal, vol. 17, no. 7, pp. 2279–2288,
2017.
[109] L. Ma, Z. Wang, and H. K. Lam, Event-triggered mean-square consensus
control for time-varying stochastic multi-agent system with sensor saturations,
IEEE Transactions on Automatic Control, vol. 62, no. 7, pp. 3524–3531, 2017.
220 Bibliography
[110] V. Malyavej and A. V. Savkin, Set-valued robust Kalman state estimation via
digital communication channels with bit-rate constraints, in Proceedings of the
American Control Conference, Denver, CO, USA, pp. 1896–1901, 2003.
[111] A. S. Matveev, State estimation via limited capacity noisy communication
channels, Mathematics of Control Signals and Systems, vol. 20, no. 1, pp. 1–35,
2008.
[112] A. S. Matveev and A. V. Savkin, Shannon zero error capacity in the problems
of state estimation and stabilization via noisy communication channels,
International Journal of Control, vol. 80, no. 2, pp. 241–255, 2007.
[113] S. Movaghati and M. Ardakani, Optimum bit-sensor assignment for dis-
tributed estimation in inhomogeneous sensor networks, IEEE Communications
Letters, vol. 18, no. 4, pp. 668–671, 2014.
[114] G. N. Nair and R. J. Evans, Stabilization with data-rate-limited feedback:
Tightest attainable bounds, Systems & Control Letters, vol. 41, no. 1, pp. 49–56,
2000.
[115] G. N. Nair and R. J. Evans, Exponential stabilisability of finite-dimensional
linear systems with limited data rates, Automatica, vol. 39, no. 4, pp. 585–593,
2003.
[116] G. N. Nair and R. J. Evans, Stabilizability of stochastic linear systems with finite
feedback data rates, SIAM Journal on Control and Optimization vol. 43, no. 2,
pp. 413–436, 2004.
[117] G. N. Nair, A nonstochastic information theory for communication and state
estimation, IEEE Transactions on Automatic Control, vol. 58, no. 6, pp. 1479–1510,
2013.
[118] G. Nagamani, B. Adhira, and G. Soundararajan, Non-fragile extended
dissipative state estimation for delayed discrete-time neural networks:
Application to quadruple tank process model, Nonlinear Dynamics, vol. 104,
no. 1, pp. 451–466, 2023.
[119] D. Nešić and D. S. Laila, A note on input-to-state stabilization for nonlinear
sampled-data systems, IEEE Transactions on Automatic Control, vol. 47, no. 7,
pp. 1153–1158, 2002.
[120] J. Ostergaard, D. E. Quevedo, and A. Ahlen, Predictive power control and
multiple-description coding for wireless sensor networks, in Proceedings of the
IEEE International Conference on Acoustics, Speech, and Signal Processing, Taipei,
Taiwan, Apr. 19–24, 2009.
[121] J. Ostergaard and D. E. Quevedo, Multiple descriptions for packetized
predictive control, Eurasip Journal on Advances in Signal Processing, vol. 2016,
Art. No. 45, 2016.
[122] C. de Persis and A. Isidori, Stabilizability by state feedback implies
stabilizability by encoded state feedback, Systems & Control Letters, vol. 53,
nos. 3–4, pp. 249–258, 2004.
[123] C. de Persis, n-Bit stabilization of n-dimensional nonlinear systems in
feedforward form, IEEE Transactions on Automatic Control, vol. 50, no. 3, pp. 299–
311, 2005.
[124] C. de Persis, Nonlinear stabilizability via encoded feedback: The case of
integral ISS systems, Automatica, vol. 42, no. 10, pp. 1813–1816, 2006.
[125] C. de Persis and D. Nešic, ´ Practical encoders for controlling nonlinear systems
under communication constraints, Systems & Control Letters, vol. 57, no. 8,
pp. 654–662, 2008.
Bibliography 221
[158] J. Wang and H. Li, Stabilization of a continuous linear system over channel
with network-induced delay and communication constraints, European Journal
of Control, vol. 31, pp. 72–78, 2016.
[159] F. Wang, J. Liang, Z. Wang, and X. Liu, A variance-constrained approach to
recursive filtering for nonlinear two-dimensional systems with measurement
degradations, IEEE Transactions on Cybernetics, vol. 48, no. 6, pp. 1877–1887,
2018.
[160] L. Wang, Z. Wang, Q.-L. Han, and G. Wei, Event-based variance-constrained
H∞ filtering for stochastic parameter systems over sensor networks with
successive missing measurements, IEEE Transactions on Cybernetics, vol. 48,
no. 3, pp. 1007–1017, 2018.
[161] L. Wang, Z. Wang, Q.-L. Han, and G. Wei, Synchronization control for a class of
discrete-time dynamical networks with packet dropouts: A coding-decoding-
based approach, IEEE Transactions on Cybernetics, vol. 48, no. 8, pp. 2437–2448,
2018.
[162] L. Wang, Z. Wang, T. Huang, and G. Wei, An event-triggered approach to
state estimation for a class of complex networks with mixed time delays and
nonlinearities, IEEE Transactions on Cybernetics, vol. 46, no. 11, pp. 2497–2508,
2016.
[163] L. Wang, Z. Wang, B. Shen, and G. Wei, Recursive filtering with measurement
fading: A multiple description coding scheme, IEEE Transactions on Automatic
Control, vol. 66, no. 11, pp. 5144–5159, 2021.
[164] L. Wang, Z. Wang, G. Wei, and F. E. Alsaadi, Finite-time state estimation for
recurrent delayed neural networks with component-based event-triggering
protocol, IEEE Transactions on Neural Networks and Learning Systems, vol. 29,
no. 4, pp. 1046–1057, 2018.
[165] J. Wang and Z. Yan, Coding scheme based on spherical polar coordinate for
control over packet erasure channel, International Journal of Robust and Nonlinear
Control, vol. 51, pp. 1159–1176, 2014.
[166] X. Wang, E. E. Yaz, and J. Long, Robust and resilient state-dependent control
of discrete-time nonlinear systems with general performance criteria, Systems
Science & Control Engineering: An Open Access Journal, vol. 2, pp. 48–54, 2014.
[167] G. Wei, S. Liu, Y. Song, and Y. Liu, Probability-guaranteed set-membership
filtering for systems with incomplete measurements, Automatica, vol. 60,
pp. 12–16, 2015.
[168] G. Wei, S. Liu, L. Wang, and Y. Wang, Event-based distributed set-membership
filtering for a class of time-varying non-linear systems over sensor networks
with saturation effects, International Journal of General Systems, vol. 45, no. 5,
pp. 532–547, 2016.
[169] N. Wiener, Cybernetics: Or Control and Communication in the Animal and the
Machine, Hermann & Cie and MIT Press, 1948.
[170] T. Wen, L. Zou, J. Liang, and C. Roberts, Recursive filtering for communication-
based train control systems with packet dropouts, Neurocomputing, vol. 275,
pp. 948–957, 2018.
[171] W. S. Wong and R. W. Brockett, Systems with finite communication
bandwidth constraints-II: Stabilization with limited information feedback,
IEEE Transactions on Automatic Control, vol. 44, no. 5, pp. 1049–1053, 1999.
224 Bibliography
[188] G. Zherlitsyn and A. S. Matveev, Min-max optimal data encoding and fusion
in sensor networks, Automatica, vol. 46, no. 9, pp. 1546–1552, 2010.
[189] D. Zhou, X. He, Z. Wang, G. P. Liu, and Y. Ji, Leakage fault diagnosis for an
internet-based three-tank system: An experimental study, IEEE Transactions on
Control Systems Technology, vol. 20, no. 4, pp. 857–870, 2012.
[190] L. Zhou and G. Lu, Detection and stabilization for discrete-time descriptor
systems via a limited capacity communication channel, Automatica, vol. 45,
no. 10, pp. 2272–2277, 2009.
[191] L. Zou, Z. Wang, and H. Gao, Set-membership filtering for time-varying
systems with mixed time-delays under Round-Robin and Weighted Try-Once-
Discard protocols, Automatica, vol. 74, pp. 341–348, 2016.
[192] L. Zou, Z. Wang, J. Hu, Y. Liu, and X. Liu, Communication-protocol-
based analysis and synthesis of networked systems: Progress, prospects and
challenges, International Journal of Systems Science, vol. 52, no. 14, pp. 3013–3034,
2021.
[193] L. Zou, Z. Wang, and D. H. Zhou, Event-based control and filtering of
networked systems: A survey, International Journal of Automation and Computing,
vol. 14, no. 3, pp. 239–253, 2017.
Index
C N
channel fading, 27, 110–112, 121–122, network-induced phenomena, 9, 21,
134–135 31, 141
consensus control, 21–23, 26, 88, 91,
107, 109
O
D one-bit symbolic data, 184
dynamical multiple description coding,
27, 141, 151, 164 P
dynamical networks, 67–68, 70, 72, 85, 88
partial-neurons-based state estimation,
46, 64
E
encoding-decoding mechanism, 4, 6, 12,
R
35, 40, 42, 49, 64, 185
event-based encoding-decoding scheme, recursive filtering, 110, 122
174, 176, 186, 196–197, 204
S
G
synchronization control, 26, 28, 65–66,
gain-scheduled state estimation, 25, 68, 70, 80–81, 83–84, 86–87
29–30, 35, 42, 45
M Z
multi-agent systems, 2, 21, 26, 88 Zeno behavior, 27, 171, 173, 184,
multiple description coding, 11, 26–27, 196
110–111, 113, 116, 120, 140–142,
151, 164
226