Severity: Warning
Message: file_get_contents(https://...@gmail.com&api_key=61f08fa0b96a73de8c900d749fcb997acc09&a=1): Failed to open stream: HTTP request failed! HTTP/1.1 429 Too Many Requests
Filename: helpers/my_audit_helper.php
Line Number: 197
Backtrace:
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 197
Function: file_get_contents
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 271
Function: simplexml_load_file_from_url
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 3165
Function: getPubMedXML
File: /var/www/html/application/controllers/Detail.php
Line: 597
Function: pubMedSearch_Global
File: /var/www/html/application/controllers/Detail.php
Line: 511
Function: pubMedGetRelatedKeyword
File: /var/www/html/index.php
Line: 317
Function: require_once
98%
921
2 minutes
20
This article presents a new event-triggered adaptive finite-time control strategy using a fuzzy state observer for a class of nonlinear cyber-physical systems (CPSs) under malicious deception attacks with a more general form. Compared with the traditional assumptions on the deception attacks in the existing results, a more general assumption on deception attacks is given in this article. During the design process, real system states are initially estimated by developing an improved state observer, which effectively addresses the problem of state unavailability. Then, a coordinate transformation technology, in which the estimated states of observer are considered, is presented to stabilize the studied system. By constructing the singularity-free finite time virtual controls, the singularity problem in the traditional finite time design algorithms is cleverly avoided. Furthermore, to minimize communication overhead, a final finite-time controller is established by using a relative threshold event-triggered scheme. The developed event-triggered adaptive finite-time control strategy guarantees that all signals in the closed-loop system are semi-globally bounded in finite time without Zeno behavior. Finally, the correctness of the proposed control strategy is validated through two simulation results.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1109/TCYB.2024.3416751 | DOI Listing |