Next Article in Journal
Plant Synthetic Promoters
Previous Article in Journal
Noise Analysis and Structural Optimization of Automobile Scroll Compressor Air Valve
Previous Article in Special Issue
Transient Analysis of a Selective Partial-Update LMS Algorithm
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Congruential Summation-Triggered Identification of FIR Systems under Binary Observations and Uncertain Communications

1
School of Automation and Electrical Engineering, University of Science and Technology Beijing, Beijing 100083, China
2
Key Laboratory of Knowledge Automation for Industrial Processes, Ministry of Education, Beijing 100083, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2024, 14(11), 4876; https://doi.org/10.3390/app14114876
Submission received: 28 April 2024 / Revised: 31 May 2024 / Accepted: 2 June 2024 / Published: 4 June 2024
(This article belongs to the Special Issue Statistical Signal Processing: Theory, Methods and Applications)

Abstract

:
With the advancement of network technology, there has been an increase in the volume of data being transmitted across networks. Due to the bandwidth limitation of communication channels, data often need to be quantized or event-triggered mechanisms are introduced to conserve communication resources. On the other hand, network uncertainty can lead to data loss and destroy data integrity. This paper investigates the identification of finite impulse response (FIR) systems under the framework of stochastic noise and the combined effects of the event-triggered mechanism and uncertain communications. The study provides a reference for the application of remote system identification under transmission-constrained and packet loss scenarios. First, a congruential summation-triggered communication scheme (CSTCS) is introduced to lower the communication rate. Then, parameter estimation algorithms are designed for scenarios with known and unknown packet loss probabilities, respectively, and their strong convergence is proved. Furthermore, an approximate expression for the convergence rate is obtained by data fitting under the condition of uncertain packet loss probability, treating the trade-off between convergence performance and communication resource usage as a constrained optimization problem. Finally, the rationality and correctness of the algorithm are verified by numerical simulations.

1. Introduction

With the development of communication technology and control theory, networked systems have been widely used in a variety of fields, such as distributed power systems, remote surgery, factory automation, and unmanned aerial vehicles [1,2,3,4,5]. Unlike traditional point-to-point systems, their feedback control exists within a network loop. We refer to such systems as networked control systems (NCSs). NCSs can be used not only for long-distance control systems, but also to greatly reduce unnecessary cabling as signals are transmitted through the network.
Due to the limited precision and cost of sensors, as well as network bandwidth constraints, the information collected by sensors needs to be quantized before transmission [6]. The quantization process reduces the amount of information in the data, increasing the difficulty of identification, making research on the identification of quantized systems highly significant. Guo et al. [7] studied the recursive identification of finite impulse response (FIR) systems, designed the algorithm using stochastic approximation under binary quantization and unreliable communication, and evaluated its convergence performance. Guo et al. [8] discussed the identification algorithm for FIR systems where both input and output are quantized, proposing a maximum likelihood-based recursive algorithm for data loss scenarios. Lei et al. [9] explored the adaptive tracking problem in strict-feedback switched nonlinear systems with quantized inputs, providing new solutions to enhance system robustness and tracking precision. Guo et al. [10] discussed the security issues in identifying FIR systems with binary observations and provided an optimal defense strategy. Ding et al. [11] considered the identification of nonlinear systems with Hammerstein structures and employed a Gaussian process to model the system impulse response. Guo et al. [12] investigated defense against data-tampering attacks within the framework of system identification with quantized observations and designed the corresponding identification algorithm.
For short sampling periods, the amount of data to be transmitted significantly increases, leading to a need for greater bandwidth and more efficient transmission channels. Thus, saving communications resources is essential, and event-triggered mechanisms are an effective solution. Shi et al. [13] presented a discrete event-driven mechanism, studied the event-driven H control of networked singular systems with state and input quantization, and further analyzed the performance. In Seifullaev et al. [14], an event-triggered control for nonlinear systems with intermittent packet transmission was investigated, and it was demonstrated through a numerical example that the method substantially reduced the number of transmissions compared to periodic sampling. Guo et al. [15] introduced an event-triggered communication scheme for binary-valued observations, to save communication resources; they proposed an algorithm for estimating unknown parameters based on weighted least-squares optimization and discussed the trade-off between average communication rate and estimation performance. Cui et al. [16] researched the remote state estimation for linear discrete-time invariant systems with event-driven mechanisms introduced by communication, employing Gaussian-conserving, event-based sensor scheduling to optimally balance communication costs and estimation accuracy. Huang and Liu [17] introduced new adaptive tracking methods for systems within two variants of event-driven architectures.
NCSs bring numerous conveniences by incorporating communication networks, but a network is not a reliable communication medium. Data packet loss, delays, and sequence disorders inevitably occur during network transmission [18]. It is a struggle to directly apply traditional control theories to the analysis of NCSs, due to these issues. In NCSs, data loss occurs when buffer overflows, router congestion, or connection interruptions happen at network nodes. Packet loss is unpredictable, leading to a lack of data integrity and adverse effects on the system. The parameter identification of network control systems relies on the observation of output data, which, being transmitted over a network, inevitably introduces elements of communication uncertainty.
In NCSs, packet loss is typically addressed through three main approaches. The first approach employs stochastic systems and statistical principles, where the packet loss is mathematically described either by using the average packet loss probability or by assuming that the packet loss adheres to a specific probability distribution. The second approach involves a design method based on time-lag systems, which is applied under conditions where the total extent of the packet loss between two sampling moments is known. The third approach transforms the periods during which packet loss occurs into interruptions in the corresponding transmission channel connections. This is integrated with the theory of motion switching systems, thereby treating NCSs experiencing packet loss as if they were dynamic systems with switching functionalities [19,20,21]. Significant advancements have been made in research focused on control and estimation under conditions of uncertain communication. Lu et al. [22] primarily investigated the fundamental issues of linear quadratic Gaussian control in NCSs with unreliable communication channels, as well as the stability of such systems under conditions of input delays, packet loss, and observation delays. Caballero-Águila et al. [23] explored the distributed fusion estimation of multi-sensor outputs under uncertain network conditions, introducing a sequence of Bernoulli random variables to describe observations for updating estimates at each sampling time, and they used predictions to compensate for information loss due to packet loss. Mohammadzadeh et al. [24] emphasized the significance of packet loss information in NCSs for enhancing control performance and identifying communication failures or attacks, proposing two methods: one involving recursive filters based on NCSs input–output models for packet loss estimation and Kalman filtering for state estimation, and the other using state space models of NCS for simultaneous estimation of controlled object states and packet loss scenarios. Yang et al. [25] investigated hierarchical fusion estimation in multi-sensor networks, employing an asynchronous sampling scheme to improve estimation performance under data packet loss and transmission delays. Sun et al. [26] created a new model for describing random transmission delays and packet loss in communication channels, introducing an optimal linear filter for estimation based on this model.
Quantization identification, event-triggered mechanisms, and system control and estimation under communication uncertainty have made significant progress. In most existing studies, uncertain channels and event-triggered mechanisms are typically applied in the control domain, yet are rarely discussed in system identification. This paper investigates FIR system identification under the combined impact of these three factors. The advantages of FIR systems in complex systems and intelligent algorithm applications are evident. With appropriate design and application, FIR systems can process and analyze complex data structures and system behaviors [27,28,29]. This makes them ideal for many signal-processing and system-identification applications. Packet loss greatly impacts the received data sequence, and the quantization process coupled with event-triggered mechanisms further reduces the amount of information in the data, creating a highly nonlinear interaction that poses great challenges for system parameter identification.
To overcome these challenges, the congruential summation-triggered communication scheme (CSTCS) and quantization are introduced, with the aim of reducing communication frequency while retaining as much information as possible available to the system. The data packet loss process is established using a set of Bernoulli random variables. Under the premise of strong correlation in the received data, an identification algorithm is designed using estimation compensation and statistical methods, and its convergence is proved in conjunction with the law of large numbers for martingales. In cases where the mean-square convergence rate is difficult to express theoretically, the relationship between the convergence rate and the proportion of data used for packet loss estimation is represented using numerical fitting methods. Furthermore, for FIR systems under the proposed communication scheme and data packet loss, the communication rate is given and the trade-off between convergence property and network resources is discussed.
The main contributions of this paper are summarized below:
  • Differently from most of the existing studies, this paper simultaneously considers the combined effects of quantization, data packet loss, and event-triggered mechanisms.
  • When the probability of packet loss is unknown, CSTCS is redesigned to obtain a new identification algorithm.
  • Numerical fitting is used to obtain an approximate expression for the mean-square convergence rate that is difficult to obtain directly, which in turn allows the trade-off between convergence property and network resources to be resolved.
The remainder of this paper is organized as follows. Section 2 describes the system model, introduces CSTCS, and describes the communication uncertainty mechanism. Section 3 designs the identification algorithm in situations where the packet loss probability is known and proves its convergence. Section 4 redesigns the identification algorithm for the scenario where the probability of packet loss is unknown and analyzes its convergence performance. Section 5 discusses the communication rate in the context of unknown packet loss probability and the trade-off between this and convergence performance. Section 6 validates the theoretical results through numerical simulations. Finally, Section 7 concludes the paper and suggests directions for future work.

2. Problem Formulation

Consider a single-input single-output discrete-time system:
y k = a 1 u k + a 2 u k 1 + + a n u k n + 1 + d k = ϕ k T θ + d k ,
where d k is the system noise; u k is the system input; ϕ k = [ u k , , u k n + 1 ] T is the regression vector consisting of the system input; θ = [ a 1 , , a n ] T R n is the unknown parameter; y k is the system output, measured by a binary sensor with a threshold of C, which can be represented by an indicator function as
s k = I { y k C } = 1 , y k C ; 0 , else .
As illustrated in Figure 1, the transmission process of s k requires passing through an event trigger. It is indicated by γ k e = 1 that the trigger was triggered and sent for the current moment of data; otherwise, it is indicated by γ k e = 0 . Moments are divided into n groups based on their congruence modulo n, and let ω 0 , i = 0 , i = 1 , 2 , , n represent the initial values of cumulative sums for n groups. At moments of congruent modulo n, the event trigger computes and updates the cumulative sums for n groups and decides whether to trigger according to their relationship to the adjustment factor m. CSTCS is as follows:
γ k e = I { s k = 1 } i = 1 n I { rem ( k , n ) = rem ( i , n ) } I { rem ( ω k , i , m ) = 0 } ,
ω k , i = ω k 1 , i + s k I { rem ( k , n ) = rem ( i , n ) } , i = 1 , 2 , , n ,
where m is a given positive integer and rem ( k , n ) denotes the remainder of k divided by n.
Remark 1.
For a positive integer n, integers z 1 and z 2 are congruent modulo n when their difference is a multiple of n.
Remark 2.
In (4), the cumulative sum of s k in n groups is essentially divided and computed through an indicator function I { rem ( k , n ) = rem ( i , n ) } . For CSTCS (3) to be triggered, the current value of s k must equal 1 and the cumulative sum ω k , i of the group corresponding to k must be divisible by the adjustment factor m; otherwise, it is not triggered.
Data s k may be lost during transmission to the remote estimator owing to uncertainty in the communication network. Denote the packet loss process with a Bernoulli random variable:
γ k d = 1 , no   packet   loss ; 0 , packet   loss .
Therefore, at the k moment, let γ k = γ k d γ k e be used to indicate whether or not data are received at the estimation center. From CSTCS (3) and (4), it is known that s k = 1 when γ k e = 1 ; then, there is γ k d γ k e s k = γ k . And when γ k = 0 , indicating that the remote center has not received any data, it is indiscernible whether this is due to a packet loss occurring during transmission or the event-triggered mechanism not being triggered.
Assumption 1.
The sequence of system noise, denoted as { d k } , consists of random variables that are independent and identically distributed. They follow a probability distribution function, represented by F ( · ) . Furthermore, the inverse function of the distribution, F 1 ( · ) , not only exists but is also twice continuously differentiable.
Assumption 2.
(1) γ k d follows a Bernoulli distribution with a probability of p, where P ( γ k d = 0 ) = p , P ( γ k d = 1 ) = 1 p . (2) The packet loss sequence { γ k d } is statistically independent of the system noise sequence { d k } .
Remark 3.
These assumptions are common in system identification and are utilized by numerous references to facilitate the analysis of systems [20,30]. These assumptions are not fundamental and they can be modified or extended to other noise models. For the non-stochastic noise, with reference to the methods in Wang et al. [30], it is possible to generalize the methods of this paper to the case of deterministic noise by adjusting the model structure.

3. Parameter Estimation Algorithm and Its Convergence: The Scenario with Known Probability of Packet Loss

Assume that the system input { u k } is n-periodic, i.e.,  u k + n = u k , k 1 . Define π 1 = ϕ 1 T , , π n = ϕ n T . Then, the circulant matrix formed by { u k } is
Φ = [ π 1 , , π n ] T .
Based on the input period n, the data length N is divided as follows:
L N = N n ,
where · denotes the floor function, representing the greatest integer less than or equal to the number “·”. For the data length N, when the probability of packet loss p is known, an algorithm is designed to estimate the unknown parameter θ :
θ ^ N = Φ 1 C F 1 ξ N , 1 , , C F 1 ξ N , n T ,
ξ N , i = m L N l = 1 L N γ ( l 1 ) n + i 1 p , i = 1 , 2 , , n ,
where F 1 ( · ) is given by Assumption 1.
Remark 4.
The effectiveness of the algorithm is predicated on the assumption that Φ is invertible. By integrating the designability of inputs with the characteristics of the circulant matrix, a condition is provided to ensure the invertibility of Φ. Specifically, it is required that u 1 + u 2 x + u 3 x 2 + + u n x n 1 = 0 does not have any unit roots.
For ease of presentation, for  i = 1 , 2 , , n , the following notations are introduced:
F i = F ( C π i θ ) ,
f i = f ( C π i θ ) ,
μ ( l , i ) = ( l 1 ) n + i ,
where f ( · ) is the probability density function of the noise.
Theorem 1.
Under uncertain communication (5), consider the system (1) that introduces CSTCS (3) and (4) and binary quantization (2). Provided that Assumptions 1 and 2 are valid, the estimate θ ^ N derived from (8) and (9) strongly converges to the true value, i.e.,
θ ^ N θ , a s N w . p . 1 .
Proof. 
Under Assumptions 1 and 2, it can be seen that
P ( s k = 1 ) = P ( y k C ) = P ( ϕ k T θ + d k C ) = P ( d k C ϕ k T θ ) = F ( C ϕ k T θ ) , P ( γ k d = 1 ) = 1 p .
Then, we have
E ( s k ) = P ( s k = 1 ) = F ( C ϕ k T θ ) ,
E ( γ k d ) = 1 p .
By the Kolmogorov law of large numbers [31], it can be ascertained that
1 L N l = 1 L N s μ ( l , i ) F i , N , i = 1 , 2 , , n ,
1 L N l = 1 L N γ μ ( l , i ) d 1 p , N , i = 1 , 2 , , n .
From (3) and (4), we have 1 L N l = 1 L N s μ ( l , i ) = m L N l = 1 L N γ μ ( l , i ) e + G N , i L N , where
G N , i = l = 1 L N s μ ( l , i ) m l = 1 L N γ μ ( l , i ) e , i = 1 , 2 , , n .
Noting that G N , i { 0 , 1 , 2 , , m 1 } , it follows that
1 L N l = 1 L N s μ ( l , i ) m L N l = 1 L N γ μ ( l , i ) e 0 , N .
Denote F k as the σ -algebra formed by d 1 , d 2 , , d k . Then, from (14) we have
E [ γ μ ( l , i ) d ( 1 p ) | F μ ( l , i ) ] = E [ γ μ ( l , i ) d ( 1 p ) ] = 0 .
Define γ ˜ μ ( l , i ) = γ μ ( l , i ) ( 1 p ) γ μ ( l , i ) e . According to the definition of γ μ ( l , i ) e , it can be seen that γ μ ( l , i ) e is F μ ( l , i ) -measurable and finite. Consequently, by Theorem 3 in ([32], p. 217) and the tower property of conditional expectation, it follows that
E [ γ ˜ μ ( l , i ) | F μ ( l , i ) 1 ] = E E [ γ ˜ μ ( l , i ) | F μ ( l , i ) ] | F μ ( l , i ) 1 = E E [ γ μ ( l , i ) ( 1 p ) γ μ ( l , i ) e | F μ ( l , i ) ] | F μ ( l , i ) 1 = E E [ ( γ μ ( l , i ) d ( 1 p ) ) γ μ ( l , i ) e | F μ ( l , i ) ] | F μ ( l , i ) 1 = E γ μ ( l , i ) e E [ ( γ μ ( l , i ) d ( 1 p ) ) | F μ ( l , i ) ] | F μ ( l , i ) 1 = E 0 | F μ ( l , i ) 1 = 0 , i = 1 , 2 , , n .
Therefore, for  i = 1 , 2 , , n , { γ ˜ μ ( l , i ) , F μ ( l , i ) , l 1 } is a martingale difference sequence.
Given γ μ ( l , i ) { 0 , 1 } and knowing that γ ˜ μ ( l , i ) p , it can be derived that E ( l = 1 L N γ ˜ μ ( l , i ) ) 2 < , and, furthermore,
l = 1 E γ ˜ μ ( l , i ) 2 l 2 l = 1 E ( p 2 ) l 2 = p 2 π 2 6 < .
By the law of large numbers for the martingale difference sequence [32], it can be seen that
1 L N l = 1 L N γ ˜ μ ( l , i ) = 1 L N l = 1 L N γ μ ( l , i ) 1 L N l = 1 L N ( 1 p ) γ μ ( l , i ) e 0 , N w . p . 1 .
From the above and (18), we have
1 L N l = 1 L N s μ ( l , i ) m L N l = 1 N γ μ ( l , i ) 1 p 0 , N , i = 1 , 2 , , n .
Together with (15), it follows that
m L N l = 1 L N γ μ ( l , i ) 1 p F i , N , i = 1 , 2 , , n .
Combining (6) and (8), the theorem is proved.    □

4. Parameter Estimation Algorithm and Its Convergence Performance: The Scenario with Unknown Probability of Packet Loss

4.1. Parameter Estimation Algorithm and Its Convergence

Select the subset O N , i 0 from O N , i = { i , n + i , , ( L N 1 ) n + i } for i = 1 , 2 , , n , ensuring that the number of elements in the subsets corresponding to different i is the same. Combine these subsets into a new set:
Z N = i = 1 n O N , i 0 .
Let the number of elements in Z N be N 0 , and  N 0 / N α , N , α ( 0 , 1 ) . In the scenario where p is unknown, improve CSTCS as follows:
γ k e = 1 , k Z N ; I { s k = 1 } i = 1 n I { rem ( k , n ) = rem ( i , n ) } I { rem ( ω k , i , m ) = 0 } , k Z ¯ N ,
ω k , i = ω k 1 , i + s k I { rem ( k , n ) = rem ( i , n ) , k Z ¯ N } , i = 1 , 2 , , n ,
where ω 0 , i = 0 , i = 1 , 2 , , n , and Z ¯ N represents the complement of Z N within { 1 , 2 , , N } .
The unknown parameter θ can be estimated by the following algorithm:
θ ^ N = Φ 1 C F 1 ζ N , 1 , , C F 1 ζ N , n T ,
ζ N , i = m L N N 0 / n k = 1 N γ k I { k O ¯ N , i 0 } 1 p ^ N , i = 1 , 2 , , n ,
p ^ N = 1 1 N 0 k = 1 N γ k I { k Z N } ,
where O ¯ N , i 0 denotes the complement of O N , i 0 within O N , i for  i = 1 , 2 , , n .
Lemma 1
([32]). If the sequences of random variables { X k } , { Y k } , { Z k } satisfy X k d X , Y k P λ 1 , and  Z k P λ 2 , then we have
X k Y k + Z k d λ 1 X + λ 2 , k ,
where λ 1 , λ 2 are finite constants.
Theorem 2.
Under the uncertain communication (5), consider the system (1) that introduces the improved CSTCS (23) and (24) and binary quantization (2). If Assumptions 1 and 2 are true, the estimate θ ^ N derived from (25)–(27) strongly converges to the true value, i.e.,
θ ^ N θ , a s N , w . p . 1 .
Proof. 
From (13) and (14), we have
E ( s k ) = P ( s k = 1 ) = F ( C ϕ k T θ ) ,
E ( γ k d ) = 1 p .
And then, by the Kolmogorov law of large numbers [31], one can obtain
1 L N N 0 / n k = 1 N s k I { k O ¯ N , i 0 } F i , N , i = 1 , 2 , , n ,
1 L N N 0 / n k = 1 N γ k d I { k O ¯ N , i 0 } 1 p , N , i = 1 , 2 , , n ,
1 N 0 k = 1 N γ k d I { k Z N } 1 p , N .
When k Z N , γ k e = 1 , and, thus, from (32) it follows that
p ^ N p , N .
From (23) and (24), we can know 1 L N N 0 / n k = 1 N s k I { k O ¯ N , i 0 } = m L N N 0 / n k = 1 N γ k e I { k O ¯ N , i 0 } + G ¯ N , i L N N 0 / n , where
G ¯ N , i = k = 1 N s k I { k O ¯ N , i 0 } m k = 1 N γ k e I { k O ¯ N , i 0 } , i = 1 , 2 , , n ,
Noting that G ¯ N , i { 0 , 1 , 2 , , m 1 } , we have
1 L N N 0 / n k = 1 N s k I { k O ¯ N , i 0 } m L N N 0 / n k = 1 N γ k e I { k O ¯ N , i 0 } 0 , N .
According to (29), when k Z ¯ N ,
E [ γ k d ( 1 p ) | F k ] = E [ γ k d ( 1 p ) ] = 0 .
Denote γ ˜ k = γ k ( 1 p ) γ k e . Then, by Theorem 3 in ([32], p. 217), it can be ascertained that
E [ γ ˜ k | F k 1 ] = E E [ γ ˜ k | F k ] | F k 1 = E E [ ( γ k d ( 1 p ) ) γ k e | F k ] | F k 1 = E γ k e E [ ( γ k d ( 1 p ) ) | F k ] | F k 1 = E 0 | F k 1 = 0 , k Z ¯ N .
Therefore, { γ ˜ k , F k , k Z ¯ N } is a martingale difference sequence. Given γ k { 0 , 1 } , it is known that γ ˜ k p . Thus, we have E ( k = 1 N γ ˜ k I { k Z ¯ N } ) 2 < and
k = 1 E ( γ ˜ k 2 ) k 2 I { k Z ¯ N } k = 1 E ( p 2 ) k 2 = p 2 π 2 6 < .
According to the law of large numbers for the martingale difference sequence, it can be seen that
1 L N N 0 / n k = 1 N γ ˜ k I { k O ¯ N , i 0 } = 1 L N N 0 / n k = 1 N γ k I { k O ¯ N , i 0 } 1 L N N 0 / n k = 1 N ( 1 p ) γ k e I { k O ¯ N , i 0 } 0 , N , i = 1 , 2 , , n w . p . 1 .
Combined with (35), we have
1 L N N 0 / n k = 1 N s k I { k O ¯ N , i 0 } m L N N 0 / n k = 1 N γ k I { k O ¯ N , i 0 } 1 p 0 , N , i = 1 , 2 , , n .
By Lemma 1, combining (30) and (33), we can obtain
m L N N 0 / n k = 1 N γ k I { k O ¯ N , i 0 } 1 p ^ N F i , N , i = 1 , 2 , , n .
The proof is completed.    □

4.2. The Relationship between Convergence Rate and α

In a scenario where the probability of packet loss is unknown, the estimation of the probability during the identification process not only wastes some communication resources but also affects the convergence property of the estimation algorithm. Use the mean square convergence rate N E ( θ ^ N θ ) ( θ ^ N θ ) T as an index to measure the performance of the algorithm. Due to the introduction of the packet loss process, the randomness of the event-triggered mechanism is enhanced, making it difficult to obtain an explicit expression for the convergence rate of the algorithm. However, the relationship between the convergence rate and α can be fitted through numerical fitting, which, in turn, can solve the trade-off issue between the network resources and the convergence property of the algorithm.
(1)
The method of selecting the subset Z N
When the probability of packet loss is unknown, knowing that α ( 0 , 1 ) , the subset is obtained differently depending on whether α is a rational or irrational number. If α is a rational number, α can be expressed as a fraction in the form of a / b , and the selection of the subset is as follows:
O N , i 0 = { x : x O N , i , rem ( x i n , b ) < a }
where O N , i = { i , n + i , , ( L N 1 ) n + i } , i = 1 , 2 , , n . Z N is given by (22). If α is an irrational number, it is selected using Algorithm 1 according to Weyl’s equidistribution theorem [33].
Algorithm 1 Generation of subset Z N when α is an irrational number
Input:
Given an irrational number α , the data length N, the input period n.
Output:
Z N is a subset of { 1 , 2 , , N } and its density is close to α .
1: L N N n
2: Z N
3:for  i = 1 to n do
4:     O N , i 0 SelectSubset( i , n , L N , α )
5:     Z N Z N O N , i 0
6:end for
7:return  Z N
8:function SelectSubset( i , n , L N , α )
9:     S empty set
10:    for  l = 1 to L N  do
11:         c u r l α l α
12:        if  c u r < α  then
13:            S . ADD ( ( l 1 ) * n + i )
14:        end if
15:    end for
16:    return S
17:end function
(2)
Data generation
According to Theorem 2, a sufficiently large N is given to guarantee the convergence of the estimation algorithm (25)–(27). Based on the above subset selection method to obtain Z N for different values of α , generate the data for sufficient number of trajectories. Use the estimation algorithm (25)–(27) to calculate the parameter estimation values of each trajectory and obtain the average of these parameter estimation values θ ¯ . Then, θ ¯ is used to replace the true value θ in the calculation of the mean square convergence rate. Also, calculate the average value of the trace of N ( θ ^ N θ ¯ ) ( θ ^ N θ ¯ ) T for the multiple trajectory data to replace the mean-square convergence rate N E ( θ ^ N θ ¯ ) T as an index for evaluating the algorithm performance. The specific data generation process is described as follows.
Given the data length N and the adjustment factor m, obtain parameter estimation values according to the identification algorithm, and repeat to acquire data for M trajectories, where M is a large positive integer. Denote each parameter estimation value as θ ^ N , j , j = 1 , 2 , , M ; then, the average parameter estimate is
θ ¯ = 1 M j = 1 M θ ^ N , j , j = 1 , 2 , , M .
Use the above equation to replace the true parameter value in the calculation of the substitution index for the mean square convergence rate, i.e., the average value of the approximate covariance matrix trace for multiple trajectory data. For convenience, denote Λ ( α ; θ ^ N ) = N ( θ ^ N θ ¯ ) ( θ ^ N θ ¯ ) T and define the average value of the matrix trace for multiple trajectories as Ω N , b = tr ( Λ ¯ ( α b ; θ ^ N , α b ) ) , b = 1 , 2 , , B , where B is the number of different values of α .
Through the above method, a set of convergence rate data { ( α 1 , Ω N , 1 ) , ( α 2 , Ω N , 2 ) , , ( α B , Ω N , B ) } can be obtained under the same m and unknown-but-consistent packet loss conditions for different values of α . The data are used for subsequent model fitting and solving optimization problems. The data generation process is illustrated in Figure 2:
(3)
Model order determination
Use polynomial fitting to model the relationship between the index and α . Since the specific order of the relationship expression is unknown, the Akaike information criterion (AIC) is used to determine the order of polynomial fitting. Suppose the fitting expression is
Ω N ( α ) = c h α h + c h 1 α h 1 + + c 1 α + c 0 ,
where h is the order of the polynomial. Denote ν h = [ c 0 , c 1 , , c h ] as the polynomial coefficients,
X h = 1 α 1 α 1 h 1 α B α B h , Y = Ω N , 1 Ω N , B .
Then, the least squares solution for the polynomial coefficients can be obtained as ν ^ h = ( X h T X h ) 1 X h T Y .
Denote the sum of the squared residuals:
e h = b = 1 B Ω N , b ( c ^ h α b h + c ^ h 1 α b h 1 + + c ^ 1 α b + c ^ 0 ) 2 .
In the calculation of AIC, the likelihood function is inversely proportional to the sum of the squared residuals. Therefore, replacing the likelihood function with the sum of the squared residuals, the calculation formula becomes
B ln e h B + 2 ( h + 1 ) .
For each order, use the least squares method to find the best polynomial coefficients, and calculate the AIC values for different orders. The final chosen fitting order is
h * = arg min h 1 { B ln e h B + 2 ( h + 1 ) } .
The corresponding polynomial coefficients are
ν ^ h * = ( X h * T X h * ) 1 X h * T Y .
Using the above method, the relationship between the trace of the approximate covariance matrix and α is obtained as
Ω N ( α ) = ν ^ h * [ 1 , α , , α h * ] T .
Denote the minimum value of Ω N ( α ) in the interval ( 0 , 1 ) as D. From the identification algorithm (25)–(27), it is known that the parameter estimate fails to converge to the true value when α is 0 or 1. So, when Ω N ( α ) in the ( 0 , 1 ) interval of the minimum value does not exist—that is, when the minimum value is obtained approaching the endpoints—there is no solution. Then, the solution that makes the convergence rate optimal is
α N * = No solution , if D does not exist ; D , if D exists .

5. Trade-Off between Communication Rate and Convergence Performance

5.1. Communication Rate with Unknown Packet Loss Probability

Theorem 3.
Under the condition that the probability of packet loss is unknown, the communication rate of the improved CSTCS (23) and (24) is
1 N k = 1 N γ k e γ ¯ = α + 1 α m n i = 1 n F i , N .
Proof. 
From (35), it is known that
1 N N 0 k = 1 N γ k e I { k O ¯ N , i 0 } 1 m ( N N 0 ) k = 1 N s k I { k O ¯ N , i 0 } 0 , N .
Combining with (30), we can obtain
1 N N 0 k = 1 N γ k e I { k O ¯ N , i 0 } F i m n , N .
Then, it follows that
1 N k = 1 N γ k e = 1 N k = 1 N γ k e I { k Z N } + γ k e I { k Z ¯ N } = 1 N N 0 + i = 1 n k = 1 N γ k e I { k O ¯ N , i 0 } + 1 N ( γ n L N + 1 e + + γ N e ) = N 0 N + i = 1 n N N 0 N 1 N N 0 k = 1 N γ k e I { k O ¯ N , i 0 } + 1 N ( γ n L N + 1 e + + γ N e ) α + 1 α m n i = 1 n F i , N .
The proof is completed.    □

5.2. Trade-Off between Convergence Performance and Communication Rate

From Theorem 3 and Section 4.2, it is clear that in scenarios where p is unknown both the communication rate and convergence rate are related to α . To represent their relationship with α , the communication rate is denoted as γ ¯ = γ ¯ ( α ) . Ω ( α ) serves as an indicator to describe the performance of the algorithm (25)–(27), which represents the trace of the covariance matrix N E ( θ ^ N θ ) ( θ ^ N θ ) T , as N tends to infinity.
What is the optimal selection of α that minimizes γ ¯ ( α ) while meeting the performance requirements of the algorithm? This can be regarded as a constrained optimization problem, as follows:
min α γ ¯ ( α ) ,
s . t . Ω ( α ) ε , α ( 0 , 1 ) ,
where ε > 0 is a constant to bound the algorithm performance. Define the solution set of Ω ( α ) ε in ( 0 , 1 ) as A ε and denote α * as the solution to (46) and (47).
Remark 5.
The index Ω ( α ) that portrays the convergence rate can be obtained approximately by using the method in Section 4.2 or by employing other nonlinear modeling methods, such as exponential and logarithmic curve fitting.
Theorem 4.
Under the conditions of Theorem 1, the solution to the optimization problem (46) and (47) is provided by
α * = min A ε ,
where min A ε denotes the minimum value in the set A ε . At this point, the communication rate of the improved CSTCS (23) and (24) is
γ ¯ ( α * ) = α * + 1 α * m n i = 1 n F i .
Proof. 
From Theorem 3, it is known that
d ( γ ¯ ( α ) ) d α = 1 1 m n i = 1 n F i .
Combining m 1 and F i < 1 , i = 1 , 2 , , n , we have d ( γ ¯ ( α ) ) d α > 0 . Furthermore, considering the solution set A ε of Ω ( α ) ε , the solution to (46) and (47) can be obtained as
α * = min A ε .
Substituting α * into (43) gives the communication rate.    □

6. Numerical Simulation

Consider the following system:
y k = ϕ k T θ + d k ; s k = I { y k C } , k = 1 , , N ,
where the noise d k obeys a Gaussian distribution with zero mean and a variance of 225, satisfying the conditions in Assumption 1; θ = [ 5 , 20 ] T , C = 70 , N = 10000 ; the minimum positive period of the input is 2, and one complete period is [ 2 , 3 ] .
The data are transmitted under data packet loss and CSTCS. Set the adjustment factor m to 5 and the packet loss probability p during data transmission to 0.3.
A portion of the data are used for estimating p when the estimation center is unaware of the packet loss probability. Figure 3 shows the event-triggered mechanism triggering and the data packet loss situation in the interval [950, 1000]. At the moments when data are utilized for estimating p, the value of γ k e is equal to 1. The subset Z N is selected as described in Section 4.2, and the data proportion used for estimating the packet loss probability is set to α = 0.5 .
The parameter θ is estimated under the unknown and known packet loss probability, respectively. Figure 4 and Figure 5 show the convergence of the parameter under the above values of m , p , α , with both θ ^ N converging gradually to the true value [ 5 , 20 ] T . This verifies the conclusions of Theorems 1 and 2. Figure 6 shows the relationship between convergence performance and p in the context of known packet loss probabilities, particularly when the packet loss probabilities are set at 0.1 , 0.3 , 0.5 . The performance measurement standard is based on the average value of | | θ ^ N θ | | generated from 200 trajectories. The higher the probability of packet loss, the worse the convergence performance.
Three different types of noise are selected that satisfy the conditions of Assumption 1 and are different from Gaussian noise: uniform distribution noise over the interval [ 20 , 20 ] , Laplace noise with zero mean and a scale parameter of 100, and Cauchy noise with a location parameter of 0 and a scale parameter of 40. Figure 7 displays the convergence of the identification algorithm under these three different types of noise when the packet loss probability is known, while Figure 8 shows the convergence of the algorithm when the packet loss probability is unknown. The fact that the algorithm still converges under these three types of noise indicates that it is not limited to Gaussian noise. Subsequent simulations and analyses are still based on Gaussian noise.
Based on Theorem 3, the calculated communication rates for α = 0.1 , 0.3 , 0.5 are 0.2207, 0.3939, and 0.5671, respectively. From Figure 9, it is clear that as N increases, the average communication rate progressively approaches the theoretical value. Furthermore, the larger α results in the higher communication rate, which is consistent with the result of Theorem 3.
Adjusting m to 10, the relationship between the convergence rate and α is obtained according to the subset selection, data generation, and model fitting methods described in Section 4.2. Figure 10 shows that the order of the model is determined to be 5 according to the AIC criterion. Figure 11 describes, under the current simulation conditions, how the index Ω N approximating the convergence rate varies with the proportion α of data used for estimating the probability of packet loss. In this case, the optimal value of α N * is 0.16. Take α = α N * and any α that is different from α N * , such as α = 0.1 , 0.3 , 0.5 , respectively. Figure 12 further verifies the optimality of α N * by using the average of | | θ ^ N θ | | calculated from 200 trajectories as a representation of the convergence performance. The convergence performance is best when α = α N * .

7. Conclusions

This paper explored the congruential summation-triggered identification of FIR systems with quantized observations under uncertain communications. CSTCS was introduced, according to system order and cumulative effect, and the packet loss process model was established using a set of Bernoulli random variables. Parameter estimation algorithms were designed for scenarios with known and unknown packet loss probabilities, respectively, and their strong convergence was demonstrated. The relationship between the convergence rate and the proportion of data used for packet loss estimation was expressed using numerical fitting, representing the trade-off between the communication rate and the convergence property as a constrained optimization problem. These provided a solution approach for system identification and optimization analysis under network congestion conditions, and, due to the strong scalability of FIR systems, the work in this paper could be extended to more complex systems. Also, the consideration of multi-threshold quantization and other aspects of communication uncertainty, such as data errors or transmission delays, is a worthwhile direction for research.

Author Contributions

Conceptualization, Y.L. and J.G.; data curation, P.Y.; formal analysis, Y.W.; investigation, X.C.; methodology, J.G.; visualization, P.Y. and Y.W.; validation, Y.W. and J.G.; writing—original draft preparation, X.C.; writing—review and editing, Y.L.; supervision, J.G. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Beijing Natural Science Foundation (4222050), the National Natural Science Foundation of China (62173030, 72101026), and Operation Expenses for Universities’ Basic Scientific Research of Central Authorities (FRF-TP-22-141A1).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Wang, S.; Meng, X.; Chen, T. Wide-area control of power systems through delayed network communication. IEEE Trans. Control Syst. Technol. 2011, 20, 495–503. [Google Scholar] [CrossRef]
  2. Zhang, D.; Shi, P.; Wang, Q.; Yu, L. Analysis and synthesis of networked control systems: A survey of recent advances and challenges. ISA Trans. 2017, 66, 376–392. [Google Scholar] [CrossRef] [PubMed]
  3. Qiu, J.; Gao, H.; Ding, S. Recent advances on fuzzy-model-based nonlinear networked control systems: A survey. IEEE Trans. Ind. Electron. 2015, 63, 1207–1217. [Google Scholar] [CrossRef]
  4. Li, M.; Hu, Y.; Guo, J. State estimation for linear discrete-time systems with binary-valued quantized innovations against data tampering attacks. J. Frankl. Inst. 2024, 361, 106817. [Google Scholar] [CrossRef]
  5. Zhang, D.; Han, Q.; Zhang, X. Network-based modeling and proportional–integral control for direct-drive-wheel systems in wireless network environments. IEEE Trans. Cybern. 2019, 50, 2462–2474. [Google Scholar] [CrossRef] [PubMed]
  6. Guo, J.; Zhang, J.; Zhao, Y. Adaptive tracking of a class of first-order systems with binary-valued observations and fixed thresholds. J. Syst. Sci. Complex. 2012, 5, 1041–1051. [Google Scholar] [CrossRef]
  7. Guo, J.; Zhao, Y.; Sun, C.; Yu, Y. Recursive identification of FIR systems with binary-valued outputs and communication channels. Automatica 2015, 60, 165–172. [Google Scholar] [CrossRef]
  8. Guo, J.; Wang, L.; Yin, G.; Zhao, Y.; Zhang, J. Asymptotically efficient identification of FIR systems with quantized observations and general quantized inputs. Automatica 2015, 57, 113–122. [Google Scholar] [CrossRef]
  9. Lei, M.; Chen, W. Adaptive control for a class of switched nonlinear systems with output constraints and quantized input signal. J. Frankl. Inst. 2023, 360, 11600–11622. [Google Scholar] [CrossRef]
  10. Guo, J.; Jia, R.; Su, R.; Zhao, Y. Identification of FIR systems with binary-valued observations against data tampering attacks. IEEE Trans. Syst. Man Cybern. Syst. 2023, 53, 5861–5873. [Google Scholar] [CrossRef]
  11. Ding, J.; Zhang, W.; Zhao, J. A kernel-based identification approach for a class of nonlinear systems with quantized output data. Digit. Signal Process. 2022, 128, 103595. [Google Scholar] [CrossRef]
  12. Guo, J.; Wang, X.; Xue, W.; Zhao, Y. System identification with binary-valued observations under data tampering attacks. IEEE Trans. Autom. Control 2021, 66, 3825–3832. [Google Scholar] [CrossRef]
  13. Shi, P.; Wang, H.; Lim, C. Network-based event-triggered control for singular systems with quantizations. IEEE Trans. Ind. Electron. 2015, 63, 1230–1238. [Google Scholar] [CrossRef]
  14. Seifullaev, R.; Knorn, S.; Ahlén, A. Event-triggered control of systems with sector-bounded nonlinearities and intermittent packet transmissions. Automatica 2022, 146, 110651. [Google Scholar] [CrossRef]
  15. Guo, J.; Diao, J. Prediction-based event-triggered identification of quantized input FIR systems with quantized output observations. China Inf. Sci. 2020, 63, 112201. [Google Scholar] [CrossRef]
  16. Cui, S.; Liu, L.; Xing, W.; Zhao, X. Periodic event-triggered estimation for networked control systems. Electronics 2021, 10, 2215. [Google Scholar] [CrossRef]
  17. Huang, Y.; Liu, Y. Practical tracking via adaptive event-triggered feedback for uncertain nonlinear systems. IEEE Trans. Autom. Control 2019, 64, 3920–3927. [Google Scholar] [CrossRef]
  18. Liu, X.; Shi, K.; Tang, Y.; Tang, L.; Wei, Y.; Han, Y. A novel adaptive event-triggered reliable H control approach for networked control systems with actuator faults. Electron. Res. Arch. 2023, 31, 1840–1862. [Google Scholar] [CrossRef]
  19. Sinopoli, B.; Schenato, L.; Franceschetti, M.; Poolla, K.; Jordan, M.I.; Sastry, S.S. Kalman filtering with intermittent observations. IEEE Trans. Autom. Control 2004, 49, 1453–1464. [Google Scholar] [CrossRef]
  20. Ma, X.; Dong, J.; Tai, W.; Zhou, J.; Paszke, W. Asynchronous event-triggered H control for 2D Markov jump systems subject to networked random packet losses. Commun. Nonlinear Sci. Numer. Simul. 2023, 126, 107453. [Google Scholar] [CrossRef]
  21. Zhang, Q.; Qi, Q.; Tan, C.; Wong, W. Decentralized control for multi-sensors networked systems with different transmission delays and packet dropouts. J. Frankl. Inst. 2022, 359, 6829–6855. [Google Scholar] [CrossRef]
  22. Lu, X.; Wang, N.; Qi, Q.; Liang, X.; Wang, H. Further study on networked control systems with unreliable communication channels. Int. J. Control Autom. Syst. 2021, 19, 329–338. [Google Scholar] [CrossRef]
  23. Caballero-Águila, R.; Hermoso-Carazo, A.; Linares-Pérez, J. Networked distributed fusion estimation under uncertain outputs with random transmission delays, packet losses and multi-packet processing. Signal Process. 2019, 156, 71–83. [Google Scholar] [CrossRef]
  24. Mohammadzadeh, A.; Tavassoli, B.; Moaveni, B. Simultaneous estimation of state and packet-loss occurrences in networked control systems. ISA Trans. 2020, 107, 307–315. [Google Scholar] [CrossRef] [PubMed]
  25. Yang, H.; Li, H.; Xia, Y.; Li, L. Hierarchical fusion estimation for multi-sensor networked systems with transmission delays and packet dropouts. Signal Process. 2019, 156, 156–165. [Google Scholar] [CrossRef]
  26. Sun, S.; Wang, G. Modeling and estimation for networked systems with multiple random transmission delays and packet losses. Syst. Control. Lett. 2014, 73, 6–16. [Google Scholar] [CrossRef]
  27. Tsoulos, I.G.; Stavrou, V.; Mastorakis, N.E.; Tsalikakis, D. GenConstraint: A programming tool for constraint optimization problems. SoftwareX 2019, 10, 100355. [Google Scholar] [CrossRef]
  28. Bansal, P.; Gill, S.S. Lightning attachment procedure optimization algorithm for optimal design of digital FIR band stop filter. Meas. Sens. 2022, 24, 100590. [Google Scholar] [CrossRef]
  29. Fan, Y.; Liu, X. Data filtering-based multi-innovation forgetting gradient algorithms for input nonlinear FIR-MA systems with piecewise-linear characteristics. J. Frankl. Inst. 2021, 358, 9818–9840. [Google Scholar] [CrossRef]
  30. Wang, L.; Yin, G.; Zhang, J.; Zhao, Y. System Identification with Quantized Observation, 1st ed.; Birkhäuser: Boston, MA, USA, 2010. [Google Scholar]
  31. Durrett, R. Probability: Theory and Examples, 5th ed.; Cambridge University Press: Cambridge, UK, 2019. [Google Scholar]
  32. Chow, Y.; Teicher, H. Probability theory: Independence, Interchangeability, Martingales, 3rd ed.; Springer: New York, NY, USA, 1997. [Google Scholar]
  33. Stein, E.M.; Shakarchi, R. Fourier Analysis: An Introduction, 1st ed.; Princeton University Press: Princeton, NJ, USA, 2003. [Google Scholar]
Figure 1. System structure.
Figure 1. System structure.
Applsci 14 04876 g001
Figure 2. Data generation process.
Figure 2. Data generation process.
Applsci 14 04876 g002
Figure 3. Data packet loss and CSTCS in the time interval [950, 1000].
Figure 3. Data packet loss and CSTCS in the time interval [950, 1000].
Applsci 14 04876 g003
Figure 4. Convergence of θ ^ N when p is known.
Figure 4. Convergence of θ ^ N when p is known.
Applsci 14 04876 g004
Figure 5. Convergence of θ ^ N when p is unknown.
Figure 5. Convergence of θ ^ N when p is unknown.
Applsci 14 04876 g005
Figure 6. Convergence performance with respect to p when the packet loss probability is known.
Figure 6. Convergence performance with respect to p when the packet loss probability is known.
Applsci 14 04876 g006
Figure 7. Convergence of θ ^ N under other types of noise when p is known.
Figure 7. Convergence of θ ^ N under other types of noise when p is known.
Applsci 14 04876 g007
Figure 8. Convergence of θ ^ N under other types of noise when p is unknown.
Figure 8. Convergence of θ ^ N under other types of noise when p is unknown.
Applsci 14 04876 g008
Figure 9. The relationship between communication rate and α .
Figure 9. The relationship between communication rate and α .
Applsci 14 04876 g009
Figure 10. The relationship between AIC and fitting order h.
Figure 10. The relationship between AIC and fitting order h.
Applsci 14 04876 g010
Figure 11. The relationship between convergence rate and α . (The red ∗ indicates the minimum value of Ω N ( α ) ).
Figure 11. The relationship between convergence rate and α . (The red ∗ indicates the minimum value of Ω N ( α ) ).
Applsci 14 04876 g011
Figure 12. The optimality of α .
Figure 12. The optimality of α .
Applsci 14 04876 g012
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Cui, X.; Yu, P.; Liu, Y.; Wang, Y.; Guo, J. Congruential Summation-Triggered Identification of FIR Systems under Binary Observations and Uncertain Communications. Appl. Sci. 2024, 14, 4876. https://doi.org/10.3390/app14114876

AMA Style

Cui X, Yu P, Liu Y, Wang Y, Guo J. Congruential Summation-Triggered Identification of FIR Systems under Binary Observations and Uncertain Communications. Applied Sciences. 2024; 14(11):4876. https://doi.org/10.3390/app14114876

Chicago/Turabian Style

Cui, Xu, Peng Yu, Yan Liu, Yinghui Wang, and Jin Guo. 2024. "Congruential Summation-Triggered Identification of FIR Systems under Binary Observations and Uncertain Communications" Applied Sciences 14, no. 11: 4876. https://doi.org/10.3390/app14114876

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop