Next Article in Journal
On a Low-Rank Matrix Single-Index Model
Next Article in Special Issue
Redundancy Allocation of Components with Time-Dependent Failure Rates
Previous Article in Journal
Text Simplification to Specific Readability Levels
Previous Article in Special Issue
Asymptotic Relations in Applied Models of Inhomogeneous Poisson Point Flows
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Event-Triggered Extended Dissipativity Fuzzy Filter Design for Nonlinear Markovian Switching Systems against Deception Attacks

by
Mourad Kchaou
1,* and
Mohamed Amin Regaieg
2
1
Department of Electrical Engineering, College of Engineering, University of Ha’il, Hail 2440, Saudi Arabia
2
Lab-STA, LR11ES50, National School of Engineering of Sfax, University of Sfax, Sfax 3038, Tunisia
*
Author to whom correspondence should be addressed.
Mathematics 2023, 11(9), 2064; https://doi.org/10.3390/math11092064
Submission received: 4 March 2023 / Revised: 2 April 2023 / Accepted: 24 April 2023 / Published: 26 April 2023

Abstract

:
This article is concerned with the adaptive-event-triggered filtering problem as it relates to a class of nonlinear discrete-time systems characterized by interval Type-2 fuzzy models. The system under investigation is susceptible to Markovian switching and deception attacks. It is proposed to implement an improved event-triggering mechanism to reduce the unnecessary signal transmissions on the communication channel and formulate the extended dissipativity specification to quantify the transient dynamics of filtering errors. By resorting to the linear matrix inequality approach and using the information on upper and lower membership functions, stochastic analysis establishes sufficient conditions for the existence of the desired filter, ensuring the mean-squared stability and extended dissipativity of the augmented filtering system. Further, an optimization-based algorithm (PSO) is proposed for computing filter gains at an optimal level of performance. The developed scheme was finally tested through experimental numerical illustrations based on a single-link robot arm and a lower limbs system.

1. Introduction, Notations, and Outline

Throughout this section, we outline the literature review, the notations, and the study objectives.

1.1. Bibliographic Review

Dynamical systems are frequently subject to random changes because of component failures, changes in subsystem interconnections, or environmental changes. These processes motivate researchers to examine and characterize Markovian jump systems (MJSs). A Markovian jump system is a stochastic hybrid system that has finite modes of operation, where jumps between modes are controlled by a Markov process. Several recent research studies have focused on MJSs, resulting in significant publications about fault tolerance, target tracking, manufacturing, networked control, and multi-agent systems [1,2,3,4,5,6]. Despite many successes in this research, most practical systems are highly nonlinear, so linear MJSs impose marked limitations in real-world applications. In addition to overcoming this drawback, the T-S fuzzy models have recently been applied to deal with nonlinear complex systems due to their effective approximation of smoothly nonlinear models [7,8,9,10,11]. In general, the T-S fuzzy system encompasses Type-1 and Type-2 fuzzy systems. Type-1 models typically have crisp membership functions, while Type-2 models are used to deal with parameter uncertainties by incorporating upper and lower membership functions [12,13,14,15].
On the other hand, networked control systems (NCSs) are a type of control system in which many components of the system are connected via shared communication networks, such as actuators, controllers, and sensors [16,17]. Under resource-constrained scenarios, such as information interactions between agents with limited communication resources, it is difficult for physical systems to obtain energy supplies in a dynamic environment. Hence, in designing a control strategy, it is important to consider economy and cost, and the above-mentioned features will inevitably be subject to some constraints. Two types of techniques are generally applied to address this issue. The first one is the intermittent control proposed in [18], wherein the control resource is designed to conserve energy in conjunction with the communication connection condition. The second approach is the event-triggered control, in which the gain or resource is selected when there is a relatively large error state between the sensor and the actuator. This technique is also considered an adequate method of addressing the energy constraints in communications networks. In recent years, the ETS has received considerable attention with numerous achievements that relate to ET H control, ET fault detection, ET sliding-mode controller design, ET consensus control, and ET state estimation systems, as summarized in [19,20,21,22,23,24,25,26,27] and the references therein. Since communication networks are open and network resources are limited, studies on cyber security issues based on communication-saving regulations for NCSs are extremely important. In particular, deception attacks pose a significant threat to the normal operation of NCSs since they are continually introducing errors into the correct data [28,29,30]. It is generally adopted to evade detection mechanisms for which the error vectors are small or even offensive in nature, thus trying to destroy the working state of the system simply by accumulating errors. Due to the wide range of applications for parameter estimation, target tracking, as well as system monitoring, the filtering problem has attracted substantial research attention in the past few decades. Furthermore, there is no doubt that the Kalman filtering method is widely used in many filter design strategies for signal processing, control, and optimization [31,32,33]. In many practical cases, however, the Kalman filter does not always fulfil the requirement that the external noise is caused by white processes with known statistical properties. For input signals with non-statistical characteristics, the performance criteria can be used to compensate for the disadvantage of Kalman filtering. The filtering issue aims at developing filters that satisfy prescribed performance levels concerning the output error and disturbance input. It is noteworthy that several efficient filtering strategies have been proposed up to this point, including the H filtering [19,34,35,36], passive/dissipative filtering [37,38,39], and peak-to-peak filtering [40,41]. In this paper, we were first motivated by the extended dissipativity performance, which has been introduced to deal with the ( Q , R , S ) -dissipative and L 2 L filtering problem in a unified framework. Further, the quoted papers examined the extended dissipative performance, which can be converted into four different performances using different parameters [10,29,42].
As an attractive approach, the event-triggered method has been recently used to cope with the filtering problem for different classes of systems, and substantial research attention with some outstanding results can be found in [36,43,44]. To mention a few, a singular neural network with time-varying delays and Markovian jump parameters was investigated in [23] to deal with the event-triggered dissipative filtering problem. An event-triggered communication mechanism was employed by the authors of [24], for the design of piecewise fuzzy diagnostic observers for discrete-time TS fuzzy systems. As has been shown in previous studies, it has been found that the above-mentioned traditional event-triggered mechanisms can reduce communication resources and improve transmission effectiveness. However, these mechanisms are designed with constant thresholds that are not capable of adjusting themselves based on actual transmission conditions. This leads to the proposal of adaptive-event-triggered mechanisms (AETMs), in which the triggering threshold is dynamically adjusted during the operation of the system. There was an investigation in [28] of the design of H filters for discrete-time networked systems with an adaptive-event-triggered mechanism and hybrid cyber-attacks. In [45], a new dynamic-event-triggered protocol was developed to address the problem of filtering for affine systems presented by the Takagi–Sugeno fuzzy model. In [20], an observer-based finite-time H controller was designed to accommodate discrete-time-varying systems with adaptive-event-triggered mechanisms. Reference [35] addressed the problem of adaptive-event-triggered H filtering for discrete-time-delayed neural networks with missing measurements that occur randomly. It can be noted that the adaptive law proposed in [46], which has a lower bound, might result in conservative conclusions. Additionally, the AETMs proposed by [47,48] each suffer from a singular problem and may degenerate into traditional periodic-time-triggered mechanisms, which may limit their application in practice. As a result of the above considerations, the motivation appears to be the development of a new AETM that is capable of improving the existing ones. Moreover, our involvement with IT-2 fuzzy systems was motivated by the fact that, unlike Type-1 TS fuzzy systems, they do not share the same membership functions with fuzzy filters or controllers. By doing so, we can overcome the network delay problem affecting the fuzzy filter’s membership functions when using the parallel distribution compensation (PDC) approach with the Type-1 T-S fuzzy systems.

1.2. Objective and Outline

We were inspired by the discussion above to pursue this study, which examines the event-triggered filter problem for a class of uncertain nonlinear systems that incorporate Markov jump switching:
(i)
As an alternative to existing filtering schemes developed for Type-1 fuzzy systems [34,38,49], this study proposes a novel filter design for Markovian jump interval Type-2 fuzzy systems that simultaneously consider an event-triggered communication scheme and a deception attack.
(ii)
This work introduces a novel adaptive-event-triggered communication scheme that improves the use of network resources as opposed to [50,51,52], which assumed the triggering parameters are constant. This mechanism was shown to alleviate network bandwidth and reduce system conservatism effectively by comparing it with other strategies [35,48,53,54].
(iii)
As described in [30,55], an improved matrix decoupling approach, which can be implemented by selecting some constants, provides greater flexibility when designing filters. This study, in contrast to previous studies, used a meta-heuristic technique based on PSO to identify the parameters accurately.
We illustrate our scheme with experimental numerical results on a single-link robot arm and an isokinetic rehabilitation system and verify the effectiveness of the proposed scheme by conducting a feasibility study. The paper is organized as follows. Section 2 introduces preliminary results in which the model and assumptions are presented, as well as the problem under study is identified. In Section 3, the main conclusions of the article are presented and derived. An optimization algorithm is presented in Section 4 for determining filter gains and for obtaining optimal performance levels. To illustrate the potential applications of the proposed scheme, as well as to validate its effectiveness, Section 5 presents the computational framework for this work and experimental numerical illustrations of the proposed methodology on a single-link robot arm and an isokinetic rehabilitation system. In Section 6, we discuss some of the findings and limitations of our proposal, as well as suggestions for further investigation.

1.3. Notations

Table 1 presents the abbreviations, acronyms, and notations used in this article.

2. System Description and Problem Formulation

2.1. Markovian Jump T-S-Fuzzy-Model-Based NCS

Consider a class of nonlinear discrete-time Markovian jump systems, which can be expressed by the following fuzzy model on a complete probability space ( Ω , F , P ) .
R i : If θ 1 ( x ( k ) ) is M i 1 and If θ 2 ( x ( k ) ) is M i 2 If θ s ( x ( k ) ) is M i s , Then x ( k + 1 ) = A i ( r ¯ k ) x ( k ) + B w i ( r ¯ k ) ( k ) y ( k ) = C 2 i ( r ¯ k ) x ( k ) z ( k ) = C 1 i ( r ¯ k ) x ( k ) + D 1 i ( r ¯ k ) ( k )
where θ ( k ) = [ θ 1 ( x ( k ) ) , θ 2 ( x ( k ) ) , , θ s ( x ( k ) ) ] are measurable premise variables of the system; M i ι , ι = 1 , 2 , , s are Type-2 fuzzy sets; i S { 1 , 2 , , r } is the number of rules. Vectors x ( k ) R n , y ( k ) R n y , w ( k ) R m , and z ( k ) R q define, respectively, the state, the output, the disturbance input, and the measured output. Matrices A i ( r ¯ k ) , B w i ( r ¯ k ) , C 1 i ( r ¯ k ) D 1 i ( r ¯ k ) , and C 2 i ( r ¯ k ) are known with appropriate dimensions. According to the i-th rule, the firing strength consists of the interval sets described as
M i = μ ̲ i ( x ( k ) ) μ ¯ i ( x ( k ) ) ,
where
μ ̲ i ( x ( k ) ) = ι = 1 s ω ̲ M i ι ( θ ( k ) ) 0 , μ ¯ i ( x ( k ) ) = ι = 1 s ω ¯ M i ι ( θ ( k ) ) 0
μ ¯ i ( x ( k ) ) μ ̲ i ( x ( k ) ) 0 , ω ¯ M i ι ( θ ( k ) ) ω ̲ M i ι ( θ ( k ) ) 0
As a result, the global fuzzy model can be inferred in the following manner:
x ( k + 1 ) = i = 1 r μ i ( x ( k ) ) A i ( r ¯ k ) x ( k ) + B w i ( r ¯ k ) ( k ) y ( k ) = i = 1 r μ i ( x ( k ) ) C 2 i ( r ¯ k ) x ( k ) z ( k ) = i = 1 r μ i ( x ( k ) ) C 1 i ( r ¯ k ) x ( k ) + D 1 i ( r ¯ k ) ( k )
The normalized membership function μ i ( x ( k ) ) satisfies i = 1 r μ i ( x ( k ) ) = 1 and is defined as
μ i ( x ( k ) ) = α ̲ i ( x ( k ) ) μ ̲ i ( x ( k ) ) + α ¯ i ( x ( k ) ) μ ¯ i ( x ( k ) ) i = 1 r α ̲ i ( x ( k ) ) μ ̲ i ( x ( k ) ) + α ¯ i ( x ( k ) ) μ ¯ i ( x ( k ) ) ,
The weighting coefficients α ̲ i ( x ( k ) ) and α ¯ i ( x ( k ) ) satisfy
0 α ̲ i ( x ( k ) ) , α ¯ i ( x ( k ) ) 1 , α ̲ i ( x ( k ) ) + α ¯ i ( x ( k ) ) = 1
and are related to the uncertain parameters of the model. These nonlinear functions may not be known, but exist and satisfy (5). Stochastic process { r ¯ k , k 0 } is a Markov chain taking values in a finite set N = { 1 , , N } with transition probability Π = [ π p q ] defined as π p q = P r ( r ¯ ( k + 1 ) = q | r ¯ k = p ) satisfying π p q 0 and q = 1 N π p q = 1 for all p , q N .

2.2. Event-Triggered Schemes

This paper assumed the measurement outputs are sent over communication channels and an event-triggered mechanism is implemented to conserve network resources and determine whether the latest sampled data packet can be transmitted to the filter system (see Figure 1). Event-triggered schemes are generally based on an event generator defined as a logic function that determines whether the sampled data should be transmitted or not. Accordingly, the event generator function is defined as follows:
U ( k , e y ( k ) ) = e y ( k ) Θ e y ( k ) σ ( k ) y ( k ) Θ y ( k )
where e y ( k ) = y ( k ) y ( k i ) is the output error, y ( k i ) is the previously transmitted data at time k i , and σ ( k ) is the event-triggered threshold. The current data transmitted depend on the following constraint:
k i + 1 = inf { k N | k > k i , U ( k , e y ( k ) ) > 0 }
where 0 k 0 k 1 k i are the sequence of ET instances. σ ( k ) in (6) can be adaptively adjusted based on the following adaptive law defined by Θ > 0 such that
Δ σ ( k ) = σ ( k + 1 ) σ ( k ) = ε 0 σ 2 ( k ) e y ( k ) Θ e y ( k )
where ε 0 is a positive constant. When ε 0 = 0 and 0 < σ ( k ) < 1 , it is clear that σ ( k ) becomes a constant.
An important feature of networked control systems is network delay, which is caused by the limited bit rate of communication channels, the waiting period during which the packets are sent, or the propagation and processing of signals. As a result, τ ( k ) [ 0 , τ M ) was included in this paper, where τ M is a positive integer. Based on the behavior of ZOH, y ¯ ( k ) holds the value of y k i in the interval [ k i + τ k i , k i + 1 + τ k i + 1 ) . Thus, we have
y ¯ ( k ) = y k i , k [ k i + τ k i , k i + 1 + τ k i + 1 )
There are then two cases that need to be discussed:
Case 1 
    If k i + τ M + 1 > k i + 1 + τ k i + 1 1 , we define τ ( k ) = k k i , k [ k i + τ k i , k i + 1 + τ k i + 1 ) . It is obvious that τ k i τ ( k ) ( k i + 1 k i ) + τ k i + 1 1 1 + τ M .
Case 2 
     If k i + 1 + τ M < k i + 1 + τ k i + 1 , we define the intervals [ k i + τ k i , k i + 1 + τ M ) , [ k i + τ M + j , k i + τ M + j + 1 ) , ( j = 1 , 2 , ) . Due to τ k i τ M , there exists a positive integer j * such that
k i + τ M + j * < k i + 1 + τ k i + 1 < k i + τ M + j * + 1
Hence, y ( k i ) and y ( k i + j ) with j = 1 , 2 , , j * 1 satisfy (7), and the time interval [ k i + τ k i , k i + 1 + τ k i + 1 ) can be divided as
[ k i + τ k i , k i + 1 + τ k i + 1 ) = j = 0 j * I j
where I 0 = [ k i + τ k i , k i + τ M + 1 ) , I j = [ k i + τ M + j , k i + τ M + j + 1 ) and I j * = [ k i + τ M + j * , k i + 1 + τ k i + 1 ) . Define
τ ( k ) = k k i , k I 0 k k i j , k I j k k i j * , k I j *
Obviously, we obtain
τ k i τ ( k ) 1 + τ M , k I 0 τ k i τ M τ ( k ) 1 + τ M , k I j τ k i τ M τ ( k ) 1 + τ M , k I j *
Therefore, we have τ m τ k i τ ( k ) τ M + 1 , k [ k i + τ k i , k i + 1 + τ k i + 1 ) . In the first case, we define e y ( k ) = 0 ; in the second case, e y ( k ) is defined as
e y ( k ) = 0 , k I 0 y ( k i ) y ( k i + j ) , k I j y ( k i ) y ( k i + j * ) , k I j *
Following the above discussion, the following relationship holds using (9):
y ¯ ( k ) = y k i = y ( k τ ( k ) ) + e y ( k ) , k [ k i + τ k i , k i + 1 + τ k i + 1 )
Remark 1. 
It is important to point out that, to mitigate the communication burden and enhance the utilization of network resources, the adaptive-event-triggered mechanism is widely used in the analysis and design of networked systems [26,27,30]. Based on the above-mentioned literature, we adopted the adaptive-event-triggered mechanism (8) to investigate the filtering problem of Markov IT-2 fuzzy systems subject to cyber-attack.
In addition, according to (8), the event-triggered interval is greater than zero [56], which indicates that the proposed event-triggered transmission mechanism does not incorporate Zeno’s behavior.

2.3. Deception Attacks

Furthermore, this paper discusses networked T-S fuzzy systems with deception attacks. The open networked environment leads to the possibility of data being modified through deception attacks in a random manner, where a stochastic process is adopted to describe this scenario.
During deception attacks, transmitted data may take the following form:
y ζ ( k ) = y ¯ ( k ) + ζ ( k ) ( y ¯ ( k ) ) + a ( y ¯ ( k ) )
Here, ζ ( k ) represents the Bernoulli random variable that meets the following conditions:
P r { ζ ( k ) = 1 } = ζ ¯ , P r { ζ ( k ) = 0 } = 1 ζ ¯
a ( y ¯ ( k ) ) represents the embedded signal launched by the attacker. It was assumed that a ( y ¯ ( k ) ) is a sufficiently smooth continuous nonlinear function satisfying the sector condition:
a ( y ¯ ( k ) ) G y ( k )
where G is a known constant matrix.

2.4. Fuzzy Filter

To estimate the signal z k in Model (4), the following fuzzy filter is defined:
R j : If ϑ 1 ( x ^ ( k ) ) is N j 1 and If ϑ 2 ( x ^ ( k ) ) is N j 2 If ϑ v ( x ^ ( k ) ) is N j v , Then x ^ ( k + 1 ) = A ^ j ( r ¯ k ) x ^ ( k ) + B ^ j ( r ¯ k ) y ζ ( k ) z ^ ( k ) = C ^ j ( r ¯ k ) x ^ ( k )
where x ^ ( k ) is the filter state, z ^ ( k ) is the filter output, ϑ ( k ) = [ ϑ 1 ( x ^ ( k ) ) , ϑ 2 ( x ^ ( k ) ) , , ϑ v ( x ^ ( k ) ) ] are the premise variables, and N j ς , ς = 1 , 2 , , v stands for the Type-2 fuzzy sets of the filter; A ^ j ( r ¯ k ) , B ^ j ( r ¯ k ) and C ^ j ( r ¯ k ) are unknown matrices that should be designed.
N j = ν ̲ j ( x ^ ( k ) ) ν ¯ j ( x ^ ( k ) ) ,
where
ν ̲ j ( x ^ ( k ) ) = ς = 1 v ω ̲ N j ς ( ϑ ( k ) ) 0 , ν ¯ j ( x ^ ( k ) ) = ς = 1 v ω ¯ N j ς ( ϑ ( k ) ) 0
ν ̲ j ( x ^ ( k ) ) ν ¯ j ( x ^ ( k ) ) 0 , ω ¯ N j ς ( ϑ ( k ) ) ω ̲ N j ς ( ϑ ( k ) ) 0
The global fuzzy filter is defined as follows:
x ^ ( k + 1 ) = j = 1 r ν j ( x ^ ( k ) ) ( A ^ j ( r ¯ k ) x ^ ( k ) + B ^ j ( r ¯ k ) y ζ ( k ) ) z ^ ( k ) = j = 1 r ν j ( x ^ ( k ) ) ( C ^ j ( r ¯ k ) x ^ ( k ) )
ν j ( x ^ ( k ) ) = β ̲ j ( x ^ ( k ) ) ν ̲ j ( x ^ ( k ) ) + β ¯ j ( x ^ ( k ) ) ν ¯ j ( x ^ ( k ) ) l = 1 r ( β ̲ l ( x ^ ( k ) ) ν ̲ l ( x ^ ( k ) ) + β ¯ l ( x ^ ( k ) ) ν ¯ l ( x ^ ( k ) ) ) , ν j ( x ^ ( k ) ) 0 , j = 1 r ν j ( x ^ ( k ) ) = 1
The two nonlinear functions β ̲ j ( x ^ ( k ) ) and β ¯ j ( x ^ ( k ) ) satisfy
0 β ̲ j ( x ^ ( k ) ) , β ¯ j ( x ^ ( k ) ) 1 , β ̲ j ( x ^ ( k ) ) + β ¯ j ( x ^ ( k ) ) = 1
For simplicity, in the sequel, μ i ( x ( k ) ) and ν j ( x ^ ( k ) ) are denoted as μ i and ν ^ j , respectively.
Let e ^ ( k ) = z ( k ) z ^ ( k ) . Taking (4) and (16) together, we can represent the filtering error system as follows:
x ˜ ( k + 1 ) = i = 1 r j = 1 r μ i ν ^ j ( A ˜ i j p x ˜ ( k ) + ( 1 ζ ¯ ) A ˜ d i j p x ˜ ( k τ ( k ) ) + ( 1 ζ ¯ ) B ˜ e j p e y ( k ) + ζ ¯ B ˜ e j p a ( y ¯ ( k ) ) + B ˜ 1 i p w ( k ) + ( ζ ( k ) ζ ¯ ) B ˜ g g ( x ˜ ( k ) ) ) e ^ ( k ) = i = 1 r j = 1 r μ i ν ^ j C ˜ i j p x ˜ ( k ) + D ˜ i p w ( k )
where x ˜ ( k ) = x ( k ) , x ^ ( k )   A ˜ i j p = A i p 0 0 A ^ j p , A ˜ d i j p = 0 0 B ^ j p C 2 i p 0 , B ˜ e j p = 0 B ^ j p , B ˜ 1 i p = B 1 i p 0 , B ˜ g = 0 I , C ˜ i j p = C 1 i p C ^ j p , D ˜ i p = D 1 i p , g ( x ˜ ( k ) ) = B ^ j p ( a ( y ¯ ( k ) ) C 2 i p x ( k τ ( k ) ) e y ( k ) ) .

2.5. Problem Formulation

Based on the above description, the objective of this article is to design the parameters of Filter (16) such that System (19) is asymptotically mean-squared stable with extended dissipative performance, i.e.:
1.
System (19) is mean-squared stable;
2.
Under zero initial conditions, the following criterion holds for w ( k ) 0 :
E k = 0 K f J ( k ) sup 0 k K f E e ^ ( k ) Ω 4 e ^ ( k )
where J ( k ) = e ^ ( k ) Ω 1 e ^ ( k ) + 2 e ^ ( k ) Ω 2 w ( k ) + w ( k ) Ω 3 w ( k ) , and matrices Ω 1 , Ω 2 , Ω 3 and Ω 4 satisfy the following assumption:
Assumption 1 
([57]). For known real matrices Ω 1 = Ω 1 0 , Ω 2 , Ω 3 = Ω 3 0 , and Ω 4 = Ω 4 = ( Ω 4 + ) Ω 4 + 0 , it was assumed that:
(i) 
D i p Ω 4 = 0 ;
(ii) 
( Ω 1 + Ω 2 ) Ω 4 = 0 .
Remark 2. 
From (20), the extended dissipativity criterion includes H , strict dissipativity, l 2 l , or passivity performances as special cases according to the different values of the matrices:
-
If Ω 1 = I , Ω 2 = 0 , Ω 3 = γ 2 I , and Ω 4 = 0 , Inequality (20) reduces to an H performance requirement.
-
If Ω 3 = R I γ ( γ > 0 ) and Ω 4 = 0 , Inequality (20) corresponds to a strict dissipativity.
-
If Ω 1 = 0 , Ω 2 = 0 , Ω 3 = γ 2 I , and Ω 4 = I , Inequality (20) reduces to an l 2 l performance.
-
If e ^ ( k ) and w ( k ) have the same dimension and Ω 1 = 0 , Ω 2 = I , Ω 3 = γ I , and Ω 4 = 0 , the passivity will be obtained.
Next, we present some preliminaries that are crucial for the derivation of our major conclusions.
Definition 1 
([58]). The filtering error system (19) is said to be stochastically mean-squared stable if the following condition holds:
E k = 0 x ˜ ( k ) 2 | ( x ˜ ( k 0 ) , r ¯ 0 ) <
for any initial condition ( x ˜ ( k 0 ) , r ¯ 0 ) .
Lemma 1 
([59]). For given positive integers τ m and τ M , a positive matrix Z, symmetric matrices, Y 11 and Y 22 , and matrices Y 12 , T 1 , and T 2 , such that
Y 11 Y 12 T 1 * Y 22 T 2 * * Z 0
the following inequality holds:
s = k τ M k τ m 1 η ( s ) Z η ( s ) ψ ( k ) τ r ( Y 11 + 1 3 Y 22 ) + sym { T 1 e 12 + T 2 e 123 } ψ ( k )
where τ r = τ M τ m 1 , η ( k ) = x ( k + 1 ) x ( k ) , and ψ ( k ) = [ x ( k τ m ) x ( k τ M ) 1 τ r + 1 s = k τ M k τ m 1 x ( s ) ] , e 12 = [ I I 0 ] , and e 123 = [ I I 2 I ] .

3. Main Results

3.1. Extended Dissipative Analysis

This section concerns the derivation of sufficient conditions in such a way that the filtering error system (19) is stochastically mean-squared stable with extended dissipativity performance.
Theorem 1. 
Consider the Markovian jump IT-2 fuzzy system (4) and Filter (16). For given matrices Θ > 0 , Ω 1 , Ω 2 , Ω 3 , and Ω 4 satisfying Assumption 1 and positive scalars ϱ s , if matrices P p , Q v , v = 1 , 2 , 3 , Z s , X 1 s , Y 1 s , Z 1 s , T 1 s , T 2 s , T 3 s , F s p , and s = 1 , 2 and scalars τ > 0 and σ 0 > 1 exist such that the following conditions hold:
  
X 11 X 12 T 11 * X 22 T 12 * * Z 1 > 0 Y 11 Y 12 T 21 * Y 22 T 22 * * Z 2 > 0 Z 11 Z 12 T 13 * Z 22 T 23 * * Z 2 > 0
P p ( C ˜ i j p ) ( Ω 4 + ) * I < 0
Φ ˜ i i p < 0 Φ ˜ i j p + ϱ 1 Φ ˜ j i p < 0 Φ ˜ i j p + ϱ 2 Φ ˜ j i p < 0 , 1 i < j r
then, System (19) is stochastically mean-squared stable and extended dissipative. The remaining matrices are defined as
Φ ˜ i j p = Ψ ˜ i j p + Ψ ^ p ( B ˜ i j p ) ( C ˜ i j p ) Ω 2 ( C ˜ i j p ) Ω 1 * s y m { ( D ˜ i p ) Ω 2 } Ω 3 ( D ˜ i p ) Ω 1 * * I Ψ ˜ i j p = Ψ ˜ 11 i j p 0 ( 1 ζ ¯ ) F 1 p A ˜ d i j p 0 0 0 0 Ψ ˜ 18 i j p ( 1 ζ ¯ ) F 1 p B ˜ e j p ζ ¯ F 1 p B ˜ e j p * Q 1 0 0 0 0 0 0 0 0 * * Ψ ˜ 33 p 0 0 0 0 ( 1 ζ ¯ ) ( F 2 p A ˜ d i j p ) ( C 2 i p ) Θ 0 * * * Q 2 0 0 0 0 0 0 * * * * 0 0 0 0 0 0 * * * * * 0 0 0 0 0 * * * * * * 0 0 0 0 * * * * * * * Ψ ˜ 88 p ( 1 ζ ¯ ) F 2 p B ˜ e j p ζ ¯ F 1 p B ˜ e j p * * * * * * * * ( 1 σ 0 ) 0 * * * * * * * * * τ I B ˜ i j p = ( F 1 p B ˜ 1 i p ) 0 0 0 0 0 0 ( F 2 p B ˜ 1 i p ) 0 0 C ˜ i j p = C ˜ i j p 0 0 0 0 0 0 0 0 0 0 , X p = q = 1 N π p q P q Ψ ˜ 11 i j p = s y m ( F 1 p ( A ˜ i j p I ) ) + ( X p P p ) + Q 1 + Q 2 + ( τ r + 1 ) Q 3 Ψ ˜ 33 p = Q 3 + ( C 2 i p ) Θ C 2 i p + ( C 2 i p ) G G C 2 i p , Ψ ˜ 18 i j p = F 1 p + X p + ( F 2 p ( A ˜ i j p I ) ) Ψ ˜ 88 p = sym ( F 2 p ) + X p + τ m Z 1 + τ r Z 2 Ψ ˜ p = Π 1 τ m ( X 11 + 1 3 X 22 ) + sym T 11 e 12 + T 12 e 123 Π 1 + Π 2 d r ( Y 11 + 1 3 Y 22 ) + sym T 21 e 12 + T 22 e 123 Π 2 + Π 3 d r ( Z 11 + 1 3 Z 22 ) + sym T 31 e 12 + T 32 e 123 Π 3 Π 1 = col e 1 e 2 e 5 , Π 2 = col e 3 e 4 e 6 , Π 3 = col e 2 e 3 e 7 e i = 0 , , 0 l 1 I λ ( l ) 0 , , 0 11 l R λ ( l ) × ( 16 n + n y + m ) , l = 1 , 2 , , 11 λ ( l ) = 2 n l = 1 , 2 , 8 n y l = 9 , 10 m l = 11
Proof. 
The stochastic stability is demonstrated for the filtering error system (19) with w ( k ) = 0 by considering a Lyapunov functional defined as V ( k ) = V 1 ( k ) + V 2 ( k ) + V 3 ( k ) + V 4 ( k ) :
V 1 ( k ) = x ˜ ( k ) P ( r ¯ k ) x ˜ ( k )
V 2 ( k ) = s = k τ m k 1 x ˜ ( s ) Q 1 x ˜ ( s ) + s = k τ M k 1 x ˜ ( s ) Q 2 x ˜ ( s ) + θ = τ M τ m s = k + θ k 1 x ˜ ( s ) Q 3 x ˜ ( s )
V 3 ( k ) = θ = τ m 1 s = k + θ k 1 η ( s ) Z 1 η ( s ) + θ = τ M τ m 1 s = k + θ k 1 η ( s ) Z 2 η ( s )
V 4 ( k ) = 1 2 ε 0 ( 1 σ ( k ) σ 0 ) 2
where η ( k ) = x ˜ ( k + 1 ) x ˜ ( k ) .
Let Δ V ( k ) be the forward difference of V ( k ) . Along the trajectories of System (19), we can demonstrate the following:
E { Δ V 1 ( k ) } = E V 1 ( k + 1 ) V 1 ( k ) | x ˜ ( k ) , r ¯ k = p = E x ˜ ( k + 1 ) X p x ˜ ( k + 1 ) x ˜ ( k ) P p x ˜ ( k ) = E η ( k ) X p η ( k ) + x ˜ ( k ) ( X p P p ) x ˜ ( k ) + 2 x ˜ ( k ) X p η ( k )
E { Δ V 2 ( k ) } ξ ( k ) e 1 Q 1 + Q 2 + ( τ r + 1 ) Q 3 e 1 e 2 Q 1 e 2 e 4 Q 2 e 4 e 3 Q 3 e 3 ξ ( k )
E { Δ V 3 ( k ) } = η ( k ) τ m Z 1 + τ r Z 2 η ( k ) s = k τ m k 1 η ( s ) Z 1 η ( s ) s = k τ M k τ ( k ) 1 η ( s ) Z 2 η ( s ) s = k τ ( k ) k τ m 1 η ( s ) Z 2 η ( s )
E { Δ V 4 ( k ) } = 1 ε 0 ( 1 σ ( k ) σ 0 ) Δ σ ( k ) σ 2 ( k ) = ( 1 σ ( k ) σ 0 ) e y ( k ) Θ e y ( k )
By Lemma 1, we can derive
s = k τ m k 1 η ( s ) Z 1 η ( s ) ξ ( k ) Π 1 τ m ( X 11 + 1 3 X 22 ) + sym T 11 e 12 + T 12 e 123 Π 1 ξ ( k )
s = k τ M k τ ( k ) 1 η ( s ) Z 2 η ( s ) ξ ( k ) Π 2 d r ( Y 11 + 1 3 Y 22 ) + sym T 21 e 12 + T 22 e 123 Π 2 ξ ( k )
s = k τ ( k ) k τ m 1 η ( s ) Z 2 η ( s ) ξ ( k ) Π 3 d r ( Z 11 + 1 3 Z 22 ) + sym T 31 e 12 + T 32 e 123 Π 3 ξ ( k )
where
ξ ( k ) = col { x ˜ ( k ) , x ˜ ( k τ m ) , x ˜ ( k τ ( k ) ) , x ˜ ( k τ M ) , 1 τ m + 1 s = k τ m k 1 x ˜ ( s ) , 1 τ M τ ( k ) + 1 s = k τ M k τ ( k ) 1 x ˜ ( s ) , 1 τ ( k ) τ m + 1 s = k τ ( k ) k τ m 1 x ˜ ( s ) , η ( k ) , e y ( k ) , a ( y ¯ ( k ) ) } .
From (19), the following null equation holds:
E { ξ ( k ) F p i = 1 r j = 1 r μ i ν ^ j ( ( A ˜ i j p I ) x ˜ ( k ) + ( 1 ζ ¯ ) A ˜ d i j p x ˜ ( k τ ( k ) ) + ( 1 ζ ¯ ) B ˜ e j p e y ( k ) + ζ ¯ B ˜ e j p a ( k ) + ( ζ ( k ) ζ ¯ ) B ˜ g g ( x ˜ ( k ) ) ) ) } = E ξ ( k ) F p i = 1 r j = 1 r μ i ν ^ j ( A ˜ i j p I ) 0 ( 1 ζ ¯ ) A ˜ d i j p 0 0 0 0 I ( 1 ζ ¯ ) B ˜ e j p ζ ¯ B ˜ e j p ξ ( k ) = 0
where F p = ( F 1 p ) 0 0 0 0 0 0 ( F 2 p ) 0 0 .
In view of (6) and considering (32), it can be established that
( 1 σ ( k ) σ 0 ) e y ( k ) Θ e y ( k ) y ( k i ) Θ y ( k i ) σ 0 e y ( k ) Θ e y ( k ) x ˜ ( k τ ( k ) ) e y ( k ) ( C 2 i p ) Θ C 2 i p ( C 2 i p ) Θ * ( 1 σ 0 ) Θ x ˜ ( k τ ( k ) ) e y ( k )
Moreover, from (13), we have
τ a ( y ¯ ( k ) ) a ( y ¯ ( k ) ) + τ y ( k ) G G y ( k ) = x ˜ ( k d ( k ) ) a ( y ¯ ( k ) ) τ ( C ˜ 2 i p ) G G C ˜ 2 i p 0 * τ I x ˜ ( k d ( k ) ) a ( y ¯ ( k ) ) 0
Combining (29)–(37), one obtains
E { Δ V ( k ) } i = 1 r j = 1 r μ i ν ^ j ξ ( k ) Λ ˜ i j p ξ ( k )
where Λ ˜ i j p = Ψ i j p + Ψ ^ p .
Assume that the membership functions are subjected to the following asynchronous constraints as described in [36]:
ν ^ j = ρ j ( k ) μ j | μ j ν ^ j | δ j
where ρ j , δ j ( j S ) are some positive constants. In light of the asynchronous constraints (40), it is evident that
0 < ρ 1 1 δ j μ ̲ j 1 δ j μ j ρ j ( k ) 1 + δ j μ j 1 + δ j μ ̲ j ρ 2
where ρ 1 and ρ 2 are the lower and upper values of ρ j ( k ) . Thus, it is easy to obtain
ϱ 1 = ρ 1 ρ 2 min ρ i ( k ) max ρ j ( k ) ρ i ( k ) ρ j ( k ) max ρ i ( k ) min ρ j ( k ) ρ 2 ρ 1 = ϱ 2
As a result of the relation (40), this yields
i = 1 r j = 1 r μ i ν ^ j Λ ˜ i j p = i = 1 r j = 1 r ρ j ( k ) μ i μ j Λ ˜ i j p = i = 1 r ρ i ( k ) μ i 2 Λ ˜ i i p + i = 1 r j > i r ρ j ( k ) μ i μ j Λ ˜ i j p + ρ i ( k ) ρ j ( k ) Λ ˜ j i p
Furthermore, assuming the relationship (43) is valid, there exists ϵ 1 > 0 and ϵ 2 > 0 satisfying ϵ 1 + ϵ 2 = 1 such that
ρ i ( k ) ρ j ( k ) = ϵ 1 ϱ 1 + ϵ 2 ϱ 2
Thus, it can be obtained from the previous equation that
Λ ˜ i j p + ρ i ( k ) ρ j ( k ) Λ ˜ j i p = l = 1 2 ϵ l ( Λ ˜ i j p + ϱ l Λ ˜ j i p )
Moreover, according to (24), (43), and (45), it can be deduced that Λ ˜ i j p < 0 and i = 1 r j = 1 r μ i ν ^ j Λ ˜ i j p < 0 . Accordingly, (39) provides the following:
E { Δ V ( k ) } λ ξ ( k ) ξ ( k )
where λ < 0 is the largest eigenvalue of Λ ˜ i j p . Thus, from (46) results
E 0 x ˜ ( k ) x ˜ ( k ) E 0 ξ ( k ) ξ ( k ) 1 λ E 0 Δ V ( k ) 1 λ V ( 0 ) < .
According to Definition 1, System (19) is stochastically mean-squared stable.
Now, the following index is suggested to examine the extended dissipativity of (19):
J = E k = 0 k f J ( k )
where J ( k ) = e ^ ( k ) Ω 1 e ^ ( k ) + 2 e ^ ( k ) Ω 2 w ( k ) + w ( k ) Ω 3 w ( k ) .
According to a similar procedure outlined above, by denoting ψ 0 ( k ) = col ξ ( k ) , w ( k ) , one can conclude that
E { Δ V ( k ) } J ( k ) = E { Δ V ( k ) } ψ 0 ( k ) { ( [ C ˜ i j p D ˜ i p ] ) Ω 1 [ C ˜ i j p D ˜ i p ] + e 1 ( C ˜ i j p ) Ω 2 e 11 + e 11 ( s y m { ( D ˜ i p ) Ω 2 } + Ω 3 ) e 11 ψ 0 ( k ) } i = 1 r j = 1 r μ i ν ^ j ψ 0 ( k ) ( Λ ˜ i j p ( B ˜ i j p ) ( C ˜ i j p ) Ω 2 * s y m { ( D ˜ i p ) Ω 2 } Ω 3 ( [ C ˜ i j p D ˜ i p ] ) Ω 1 [ C ˜ i j p D ˜ i p ] ) ψ 0 ( k )
In light of the above proof, it can be concluded that
i = 1 r j = 1 r μ i ν ^ j Φ ˜ i j p < 0
By applying the Schur complement property to Φ ˜ i j p < 0 , it is obvious to derive from (49) that
E { Δ V ( k ) } J ( k ) < 0
Under Assumption 1, we validated that the condition (20) holds:
(i)
When Ω 4 = 0 , by summating (51) from 0 to k f , the following condition holds under zero initial conditions:
E { k = 0 k f J ( k ) } > E { V ( k f + 1 ) V ( 0 ) } = E { V ( k f + 1 ) } > 0
According to Assumption 1 with Ω 4 = 0 , Condition (20) holds.
(ii)
When Ω 4 0 , it follows from Assumption 1 that: D ˜ i p = 0 , Ω 1 = 0 , Ω 2 = 0 , and Ω 3 > 0 . In this case, the following condition holds:
E { k = 0 k f 1 J ( k ) } > E { V ( k f ) } > E { x ˜ ( k f ) P p x ˜ ( k f ) } > 0
From (23), we have
( C ˜ i j p ) Ω 4 C ˜ i j p < P p
In the case of k = k f , we obtain
E { k = 0 k f 1 J ( k ) } > E { x ˜ ( k f ) P p x ˜ ( k f ) } > E { e ^ ( k f ) Ω 4 e ^ ( k f ) }
Due to Ω 1 = 0 , Ω 2 = 0 , and Ω 3 > 0 , we obtain
E k = 0 k f J ( k ) > sup 0 k k f E e ^ ( k ) Ω 4 e ^ ( k )
Hence, we can conclude, according to (20), that the filtering error system (19) is extended dissipative.  □

3.2. Filter Design

Theorem 2. 
System (19) is stochastically stable and extended dissipative for given matrices Θ > 0 , Ω 1 , Ω 2 , Ω 3 , and Ω 4 satisfying Assumption 1, positive scalars ϱ s , and tuning parameters a s , b s , s = 1 , 2 , if the matrices P p , Q v , v = 1 , 2 , 3 , Z s , X 1 s , Y 1 s , Z 1 s , T 1 s , T 2 s , T 3 s , F 1 s p , F 2 s p , U p , A ^ j p , B ^ j p , and C ^ j p and positive scalar σ 0 > 1 exist such that (22), (23), and the following conditions are satisfied:
Υ ˜ i i p < 0 Υ ˜ i j p + ϱ 1 Υ ˜ j i p < 0 Υ ˜ i j p + ϱ 2 Υ ˜ j i p < 0 , 1 i < j r , p N
where
Υ ˜ i j p = Γ ˜ i j p + Ψ ^ p ( B ˜ i j p ) ( C ˜ i j p ) Ω 2 ( C ˜ i j p ) Ω 1 * s y m { ( D ˜ i p ) Ω 2 } Ω 3 ( D ˜ i p ) Ω 1 * * I Γ ˜ i j p = Γ ˜ 11 i j p 0 ( 1 ζ ¯ ) A d 1 i j p 0 0 0 0 Γ ˜ 18 i j p ( 1 ζ ¯ ) B e 1 j p ζ ¯ B e 1 j p * Q 1 0 0 0 0 0 0 0 0 * * Ψ ˜ 33 i j p 0 0 0 0 ζ ¯ ( A d 2 i j p ) ( C 2 i p ) Θ 0 * * * Q 2 0 0 0 0 0 0 * * * * 0 0 0 0 0 0 * * * * * 0 0 0 0 0 * * * * * * 0 0 0 0 * * * * * * * Ψ ˜ 88 p ( 1 ζ ¯ ) B e 2 j p ( 1 ζ ¯ ) B e 2 j p * * * * * * * * ( 1 σ 0 ) I 0 * * * * * * * * * τ I Γ ˜ 11 i j p = s y m ( A 1 i j p ) + ( X p P p ) + Q 1 + Q 2 + ( τ r + 1 ) Q 3 Γ ˜ 18 i j p = F 1 p + X p + ( A 2 i j p ) F s p = F 1 s p a s U p F 2 s p b s U p A s i j p = F 1 s p A i p a s A ^ j p F 2 s p A i p b s A ^ j p A d s j p = a s B ^ j p C 2 i p 0 b s B ^ j p C 2 i p 0 , B e s j p = a s B ^ j p b s B ^ j p
Furthermore, the filter gains are given by
A ^ j p = ( U p ) 1 A ^ j p , B ^ j p = ( U p ) 1 B ^ j p , C ^ j p = C ^ j p
Proof. 
According to Theorem 2, a feasible solution must satisfy the condition Ψ ˜ 88 p < 0 . Thus, it is easy to verify that sym ( F 2 p ) < 0 and sym ( ( U p ) ) < 0 . It follows that U p is nonsingular. Moreover, using the fact that
A s j p = F s p A s j p , A d s j p = F s p A d s j p , B e s j p = F s p B e s j p , s = 1 , 2
it can be verified that (57) is equivalent to (24). Hence, according to Theorem 1, System (19) is stochastically mean-squared stable and extended dissipative.    □

4. Optimization-Based Filter Design Algorithm

An important aspect of the filter design lies in the choice of the parameters a s and b s , s = 1 , 2 . Additionally, the coupling terms a s A ^ j p , b s A ^ j p , a s B ^ j p , and b s B ^ j p in Γ ˜ i j p can be reduced to linear ones if these parameters are determined a priori. Therefore, finding suitable a s and b s is a natural approach to obtaining the optimized gains A ^ j p and B ^ j p . To achieve this, we constructed one of the following optimization problems according to the performance to be taken into account:
(i)
Dissipative/ passivity performances:
min γ subject to ( 22 ) , ( 23 ) ( 57 ) ;
(ii)
H / l 2 l performances:
min γ 2 subject to ( 22 ) , ( 23 ) ( 27 ) .
Through the particle swarm optimization algorithm (PSO) [60], we give the following solving method for the above optimization problems (60) or (61). In the PSO algorithm, the parameters are chosen arbitrarily by specifying the number of particles, and the decision values corresponding to the parameters that need to be evaluated using the position vector for the l t h particle, as described below:
X l = a 1 l a 2 l b 1 l b 2 l T
where l denotes the swarm size (count of particles). Each iteration k of the algorithm updates the velocity for every particle in the swarm, and the positions are determined by using the following equations:
X k + 1 ( l ) = v k ( l ) + c 1 r 1 X p k ( l ) X k ( l ) + c 2 r 2 X g k ( l ) X k ( l ) v k + 1 ( l ) = X k ( l ) + v k + 1 ( l )
In these equations, X k ( l ) represents the current candidate solution encoded according to the position of the l t h particle during iteration k and X k + 1 ( l ) represents the updated particle position. X k ( l ) [ X L , X U ] with X L and X U denote the lower and upper bounds of X . v k + 1 ( l ) and v k ( l ) are the respective velocities of the new and old particles. X p k ( l ) denotes the best position, which the l t h particle attained in the past. X g k ( l ) denotes the best position between the neighbors of every particle and is also referred to as the “gbest”. Parameters r 1 and r 2 correspond to two random numbers in the range ( 0 , 1 ) . Parameters c 1 and c 2 refer to the coefficients of acceleration, which determine how far a particle will reach during a single generation. Below is a detailed Algorithm 1 of the proposed approach:
Algorithm 1 Determining the minimum performances and filter gains
1:
(Step 1): This step specifies the PSO population size n p , the particle dimension d, and the maximum number of iterations i t .
2:
(Step 2): Initialize the particle’s position and velocity.
3:
(Step 3): Determine the parameters of X ( l ) and calculate the fitness value corresponding to these parameters according to the Equation (62).
4:
(Step 4): Compare each particle’s fitness value with the best (minimized) value during its historical search, along with its position, which is stored as X p k ( l ) . Furthermore, the “gbest” particle position corresponding to the minimized fitness value in the population is saved as X g k ( l ) .
5:
(Step 5): As a result of (62), update the position of each particle, as well as its velocity.
6:
(Step 6): If the number of iterations reaches the maximum number of iterations i t , then proceed to Step 7. Otherwise, go to Step 3.
7:
(Step 7): X p k ( l ) is defined as the optimal solution desired, and the optimal parameters are calculated.

5. Numerical Applications

This section of the paper details the computational framework used in the proposed method and illustrates its usefulness and advantages by employing the nonlinear single-link robot arm and lower limbs systems.

5.1. Computational Framework and Algorithm

Computational experiments were conducted using the Matlab programming language and a computer with the following characteristics: (i) (OS) Windows 10 Enterprise for 64 bits; (ii) (RAM) 8 gigabytes; (iii) (processor) Intel(R) Core(TM) i7-4790T CPU @ 2.70 gigahertz.
After a rigorous process of designing the filter, the detailed procedure is summarized in Algorithm (1) for determining the minimum performances and filter gains. This algorithm was applied using the Yalmip software in conjunction with the mosek optimization toolbox.

5.2. Single-Link Robot Arm System

Consider the single-link robot arm system described in [34] and stated as
x 1 ( k + 1 ) = x 2 ( k ) x 2 ( k + 1 ) = m ( r ¯ ( k ) ) g l T e J ( r ¯ ( k ) ) sin ( x 1 ( k ) ) + ( 1 D ( r ¯ ( t ) ) T e J ( r ¯ ( t ) ) ) x 2 ( k ) + T e J ( r ¯ ( t ) ) u ( k )
with x 1 ( k ) , x 2 ( k ) , m ( r ¯ ( k ) ) , J ( r ¯ ( k ) ) , D ( r ¯ ( k ) ) , and l being, respectively, the angle position, angle velocity, masses, moment of inertia, damping, and length of the robot arm, respectively. As in [34], the system can be converted into a Markov switching fuzzy system in the form of (4) with T s = 0.1 s , and the related transition-probability matrix is defined as:
Π = 0.5 0.25 0.25 2 / 14 9 / 14 3 / 14 0.35 0.15 0.5 .
The considered model is described by the following system matrices:
A 1 1 = 1 0.1 0.49 0.7 , A 1 2 = 1 0.1 0.43 0.66 , A 1 3 = 1 0.1 0.55 0.68 , A 2 1 = 1 0.1 0.42 0.7 , A 2 2 = 1 0.1 0.25 v 0.66 , A 2 3 = 1 0.1 0.29 0.68 B w i p = 0 0.1 , C 2 i p = 1 0 , C 1 i p = 0 1 , D 1 i p = 0 , p = 1 , 2 , 3 .
The membership functions are defined as follows:
h 1 ( x 1 ( k ) ) = sin ( x 1 ( k ) ) β 0 x 1 ( k ) ( 1 β 0 ) x 1 ( k ) , x 1 ( k ) 0 1 x 1 ( k ) = 0 h 2 ( x 1 ( k ) ) = x 1 ( k ) sin ( x 1 ( k ) ) ( 1 β 0 ) x 1 ( k ) , x 1 ( k ) 0 0 x 1 ( k ) = 0
with β 0 = 10 2 / π .
Next, we give the MFs of the filter. Define a nonlinear function as l ( x ^ 1 ( k ) ) = x ^ 1 2 ( k ) . For x ^ 1 ( k ) [ π 0.01 , π + 0.01 ] , we have l ( x ^ 1 ( k ) ) [ l m i n ( x ^ 1 ( k ) ) , l m a x ( x ^ 1 ( k ) ) ] with l m i n ( x ^ 1 ( k ) ) = 0 and l m a x ( x ^ 1 ( k ) ) = ( π 0.01 ) 2 . The MFs of the filter are given as ν 1 ( x 1 ^ ( k ) ) = l ( x ^ 1 ( k ) ) l ˘ m i n ( x ^ 1 ( k ) ) l ˘ m a x ( x ^ 1 ( k ) ) l ˘ m i n ( x ^ 1 ( k ) ) and ν 2 ( x 1 ^ ( k ) ) = l ˘ m a x ( x ^ 1 ( k ) ) l ( x ^ 1 ( k ) ) l ˘ m a x ( x ^ 1 ( k ) ) l ˘ m i n ( x ^ 1 ( k ) ) with l ˘ m i n ( x ^ 1 ( k ) ) = l m i n ( x ^ 1 ( k ) ) 0.1 and l ˘ m a x ( x ^ 1 ( k ) ) = π 2 + 0.1 .
For τ m = 1 , τ M = 5 , Θ = 3 , ζ ¯ = 0.8 , ϱ 1 = 0.15 , ϱ 2 = 1 / 0.15 , a ( k ) = tanh ( 0.6 y ( k ) ) , and G = 0.6 , Algorithm 1 is performed to design filters satisfying the extended dissipative performance from four aspects, namely H , l 2 l , passive, and dissipative performances. For the given cases, Table 2 lists the minimum allowable values for a s , b s , ( s = 1 , 2 ) , and γ .
Then, we were concerned with different cases to conclude our discussion:
Case I: passivity filtering: 
A ^ 1 1 A ^ 2 1 B ^ 1 1 B ^ 2 1 A ^ 1 2 A ^ 2 2 B ^ 1 2 B ^ 2 2 A ^ 1 3 A ^ 2 3 B ^ 1 3 B ^ 2 3 = 0.76238 0.1182 0.77373 0.12784 0.24699 0.25917 0.85348 0.31808 0.70568 0.31865 0.076161 0.20964 i n e 0.62687 0.078345 0.68218 0.059552 0.33982 0.42384 1.4991 0.26763 1.3146 0.20334 0.40852 1.2533 i n e 0.68872 0.085852 0.70391 0.10369 0.28929 0.39769 1.2972 0.2118 0.92588 0.17481 0.078596 0.83558 C ^ 1 1 C ^ 2 1 C ^ 1 2 C ^ 2 2 C ^ 1 3 C ^ 2 3 = 0.38676 0.10875 0.38987 0.10831 i n e 0.57935 0.11218 0.58156 0.11422 i n e 0.47562 0.087605 0.49095 0.084071
Case II: dissipativity filtering: 
A ^ 1 1 A ^ 2 1 B ^ 1 1 B ^ 2 1 A ^ 1 2 A ^ 2 2 B ^ 1 2 B ^ 2 2 A ^ 1 3 A ^ 2 3 B ^ 1 3 B ^ 2 3 = 0.75035 0.10162 0.76625 0.115 0.26128 0.27117 0.67407 0.53154 0.51703 0.53359 0.076572 0.19088 i n e 0.56972 0.052941 0.63612 0.027462 0.34737 0.47697 1.3854 0.46117 1.216 0.38875 0.45019 1.3471 i n e 0.60712 0.041119 0.61428 0.053424 0.30315 0.52321 1.4628 0.3626 1.1198 0.28418 0.19734 1.4148 C ^ 1 1 C ^ 2 1 C ^ 1 2 C ^ 2 2 C ^ 1 3 C ^ 2 3 = 0.32311 0.15403 0.32593 0.15345 i n e 0.61589 0.16114 0.61878 0.16324 i n e 0.4861 0.088156 0.50649 0.085026
Case III:  H  filtering:
A ^ 1 1 A ^ 2 1 B ^ 1 1 B ^ 2 1 A ^ 1 2 A ^ 2 2 B ^ 1 2 B ^ 2 2 A ^ 1 3 A ^ 2 3 B ^ 1 3 B ^ 2 3 = 0.8641 0.074582 0.88691 0.092459 0.15007 0.15425 0.44428 0.7861 0.30547 0.78572 0.038087 0.02165 i n e 0.64921 0.017533 0.83116 0.06009 0.2362 0.31973 0.45812 0.74357 0.091925 0.70545 0.017246 0.1741 i n e 0.33701 0.15945 0.24163 0.10596 0.1781 1.7443 1.0908 0.47433 1.3547 0.57936 0.42549 2.786 C ^ 1 1 C ^ 2 1 C ^ 1 2 C ^ 2 2 C ^ 1 3 C ^ 2 3 = 0.00036846 0.63323 0.014015 0.63422 i n e 0.070462 0.57629 5.1593 . 10 6 0.47536 i n e 0.16548 0.51958 0.042926 0.52235
Case IV:  H  
filtering in [34]: In this case, we used the filter proposed in [34] with a constant threshold σ = 0.5 .
For the first three cases, the gains were calculated by employing the minimal values recorded in Table 2.

5.2.1. Results and Graphical Plots

Given the initial conditions x ( 0 ) = x ^ ( 0 ) = 0 0 T , the numerical simulations were performed for w ( k ) = 8 s i n 2 ( k ) e 0.3 k . For different cases, the simulation results are depicted in Figure 2, Figure 3, Figure 4 and Figure 5, where the switching signal r ¯ ( k ) and Bernoulli distribution are, respectively, depicted in Figure 6a,b.

5.2.2. Comparative Explanations

Figure 2a, Figure 3a, Figure 4a, Figure 5a display the output z ( k ) and its estimation z ^ ( k ) . Figure 2b, Figure 3b, Figure 4, Figure 5b show the event-triggered release instants and the intervals. According to the time-triggered schemes, the percentages of transmitted data for different cases are shown in Table 3. Moreover, the table provides an overview of the comparison using a quantitative analysis, where the deviations of the state error e ^ ( k ) are investigated by computing the integral squared error (ISE) and the integral absolute error (IAE) for different filters. In light of our results, we can substantiate that our method effectively mitigates the waste of computational resources and communication channels, with the smallest total deviation of e ^ ( k ) . To evaluate the merit of the proposed approach, the adaptive ET scheme proposed by [48] was applied to the system, as shown in Figure 7b. Using the AET mechanism described in [48], the adaptive variable showed clearly a negative value, which is inaccurate.

5.3. A Lower Limbs Rehabilitation System

As shown in Figure 8, this example uses an isokinetic rehabilitation system for the lower limbs, which can assist the handicapped in Hail is described by the following differential nonlinear equation [61]:
Γ m = J m θ ¨ + f m θ k m θ ˙ | θ ˙ | θ ˙ 2 F l a cos ( θ ) b sin ( θ )
Γ m , J m , and f m , respectively, represent the controlled variables that determine the torque, inertia, and viscous friction. Moreover, the variables θ ¨ , θ ˙ , and θ correspond to the angular position, velocity, and acceleration of the mobile part. The torque delivered by the patient is described by F times l; the potential energy of the system is described by a cos ( θ ) ; the centrifugal force coefficient is described by b sin ( θ ) , while the centrifugal force coefficient needs to be added or subtracted according to the velocity sign. Define x ( t ) = [ x 1 ( t ) , x 2 ( t ) ] = [ θ ˙ , θ ] , u ( t ) = Γ m , and w ( t ) = F . A discrete-time model of System (68) can be obtained by applying Euler’s discretization:
x 1 ( k + 1 ) = ( 1 + T s g ( k m , x 1 ( k ) ) ) x 1 ( k ) + T s f ( x 2 ( k ) ) x 2 ( k ) + T s J m u ( k ) + T s l J m w ( k ) x 2 ( k + 1 ) = x 2 ( k ) + T s ( k )
with g ( k m , x 1 ( k ) ) = k m | x 1 ( k ) | f m J m and f ( x 2 ( k ) ) = a cos ( x 2 ( k ) ) b sin ( x 2 ( k ) ) J m x 2 ( k ) .
A list of the parameters of the system can be found in Table 4. As a further consideration, it was assumed that parameter J m has two different modes, listed in the table. Given the uncertainty associated with the parameter k m , it is evident that the IT-2 fuzzy system should be adopted to model a nonlinear system (68). Assume that x 1 ( k ) [ 2 π , 2 π ] and x 2 ( k ) [ π / 180 , 2 π / 3 ] ; we can obtain g m a x = 3.0651 and g m i n = 11.806 , and g ( x 1 ( k ) ) [ g ¯ m a x , g ¯ m i n ] = [ 4 , 12 ] .
By adopting the sector nonlinearity method, the membership functions of the corresponding IT-2 fuzzy model are defined as
μ 1 ( x 1 ( k ) ) = m 1 ( x 1 ( k ) ) h 1 ( x 2 ( k ) ) , μ 2 ( x 1 ( k ) ) = m 2 ( x 1 ( k ) ) h 2 ( x 2 ( k ) ) , μ 3 ( x 1 ( k ) ) = m 1 ( x 1 ( k ) ) h 1 ( x 2 ( k ) ) , μ 4 ( x 1 ( k ) ) = m 2 ( x 1 ( k ) ) h 2 ( x 2 ( k ) )
with m i ( x 1 ( k ) ) = m ̲ i ( x 1 ( k ) ) sin 2 ( x 1 ( k ) ) + m ¯ i ( x 1 ( k ) ) cos 2 ( x 1 ( k ) ) , m ̲ 1 ( x 1 ( k ) ) = g ¯ m a x g ( 80 , x 1 ( k ) ) g ¯ m a x g ¯ m i n , m ¯ 1 ( x 1 ( k ) ) = g m a x g ( 70 , x 1 ( k ) ) g ¯ m a x g ¯ m i n , m ̲ 2 ( x 1 ( k ) ) = 1 m ¯ 1 ( x 1 ( k ) ) , m ¯ 2 ( x 1 ( k ) ) = 1 m ̲ 1 ( x 1 ( k ) ) , h 1 ( x 2 ( k ) ) = 187.35 f ( x 2 ( k ) ) 187.75 , and h 2 ( x 2 ( k ) ) = 1 h 1 ( x 2 ( k ) ) .
Thus, the dynamical model of (68) can be described by the Markov switching fuzzy system in the form of (4) with T s = 0.025 s, and the transition probability rate matrix and the system matrices are defined as:
A 1 1 = 0.2557 6.1348 0.0250 1.0000 , A 2 1 = 0.2561 1.3733 0.0250 1.0000 , A 3 1 = 0.0706 6.0071 0.0250 1.0000 , A 4 1 = 0.0706 1.4156 0.0250 1.0000 , A 1 2 = 0.2488 6.0116 0.0250 1.0000 , A 2 2 = 0.2487 1.4191 0.0250 1.00001 , A 3 2 = 0.0649 5.8815 0.0250 1.0000 , A 4 2 = 0.0644 1.4777 0.0250 1.0000 , B i 1 = 0.00037 0 , B i 2 = 0.000355 0 , Π = 0.7 0.3 0.2 0.8
For τ m = 2 , τ M = 6 , Θ = 5 , ζ ¯ = 0.85 , ϱ 1 = 0.15 , and ϱ 2 = 1 / 0.15 , Algorithm 1 was performed, and the optimal values of the l 2 l performance were obtained as: a 1 * = 2.0581 , a 2 * = 2.5176 , b 1 * 0.1309 b 2 * = 0.1744 , and γ * = 7 . 223 4 . The filter matrices are designed as
A ^ 1 1 A ^ 2 1 A ^ 3 1 A ^ 4 1 A ^ 1 2 A ^ 2 2 A ^ 3 2 A ^ 4 2 = 0.073469 3.4221 0.083413 0.6332 0.20643 3.2698 0.21936 0.73011 0.01021 0.926 0.0076208 0.97167 0.011397 0.92152 0.012629 0.97586 i n e 0.060213 2.8422 0.092627 0.75619 0.17697 2.6329 0.19582 0.79572 0.013459 0.93971 0.010413 0.96712 0.014624 0.93769 0.018435 0.97071 B ^ 1 1 B ^ 2 1 B ^ 3 1 B ^ 4 1 B ^ 1 2 B ^ 2 2 B ^ 3 2 B ^ 4 2 = 9.5398 9.3138 8.6087 6.7673 0.0038308 0.32511 0.042507 0.38779 i n e 7.5654 6.6368 6.6323 5.2521 0.041711 0.28217 0.019727 0.29285 C ^ 1 1 C ^ 2 1 C ^ 3 1 C ^ 4 1 C ^ 1 2 C ^ 2 2 C ^ 3 2 C ^ 4 2 = 0.029365 0.015436 0.029365 0.015436 0.029365 0.015436 0.029365 0.015436 i n e 0.044923 0.026018 0.044923 0.026018 0.044923 0.026018 0.044923 0.026018
According to the above parameters, the simulation results are presented in Figure 9, Figure 10 and Figure 11, where Figure 11b illustrates, respectively, the random variables r ¯ ( k ) and ζ ( k ) . As an intuitive method for evaluating the communication performance of the designed filter, Figure 9a, Figure 10a, Figure 11a record the trajectories of the system’s and filter’s outputs, the triggering instants and intervals of each system state component, as well as the dynamic threshold parameters for the different trigger mechanisms suggested in [35,48,53,54]. As can be seen in these figures, the implemented filter for different ETMs can guarantee the convergence of the system’s states despite uncertainties, external disturbances, and cyber-attacks. Based on Table 5, it appears that the application of the AETM in this article may further optimize communication resources and reduce bandwidth usage because the number of data packets transmitted with an acceptable IAE was significantly less than the number of data packets transmitted using the ETMs in [35,48,53,54,62].

5.4. Comparative Explanations

The dynamic- and adaptive-event-triggered filtering problem for nonlinear networks has recently been the subject of numerous studies in the literature, so several methods are comparable to what we presented here. There are, however, some differences from our approaches as follows:
  • To handle nonlinear network systems, a H linear filter was designed in [26] using Type-1 fuzzy models, which may lead to conservative results. As an alternative, we took a more general approach based on a Markovian jump Type-2 fuzzy model to design an IT2 fuzzy filter with extended dissipativity performance.
  • Different from [49,62], the filter design method described in [26] was based on an improved matrix decoupling approach that uses appropriate selected scalars. The selection of these parameters can be achieved either by a numerical analysis or by using meta-heuristic techniques, such as the PSO method addressed in this study.

6. Conclusions, Limitations, and Future Work

Some conclusions, possibilities for future developments, and limitations of the filtering strategy are presented in this section.

6.1. Concluding Remarks

For a class of nonlinear discrete-time systems described by Markov jumping IT-2 fuzzy models, a novel adaptive-event-triggered extended dissipativity-based filtering problem was developed. This study successfully addressed the hypothesis of perturbations and the random occurrence of cyber-attacks. As a means of reducing the unnecessary use of limited communication resources, a new event-triggered scheme with an adaptive triggering scheme was used to determine whether or not the current measurements needed to be transmitted. Furthermore, delay-dependent conditions were developed for the filter design in order to ensure that the error system would be stochastically stable with extended dissipativity performance. Using the upper and lower membership functions, less conservative results were obtained. Furthermore, an optimization-based algorithm (PSO) was used for the determination of the filter gains and to achieve the best-possible performance. Finally, this paper concluded with two examples that illustrated how effective the method proposed here can be.

6.2. Limitations

Despite the power and performance of the synthesized technique, the latter imposes that the Markov chain transition probability is known as a delicate task in practice. Equally important, the synchronization between modes of the filter and model is a task that may be difficult to achieve in practice.

6.3. Future Work

Further research that may be focused on in the context of the present study is related to the state estimation of singular systems based on the dynamic-event-triggered communication protocol [56,63]. Moreover, the determination of partial and time-varying transition probabilities in our framework is an open problem to be addressed in the future.

Author Contributions

Writing—review & editing, M.A.R.; Project administration, M.K. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Scientific Naser Al-Rasheed Research Chair at the University of Ha’il—Saudi Arabia through Project Number SCR-22 102.

Data Availability Statement

The data are contained within the article.

Acknowledgments

The authors thank the Reviewers for their constructive comments, which helped to obtain an improved version of the article.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Hou, L.; Chen, D.; He, C. Finite-time nonfragile dissipative control for discrete-time neural networks with Markovian jumps and mixed time-delays. Complexity 2019, 2019, 5748923. [Google Scholar] [CrossRef]
  2. Sathishkumar, M.; Sakthivel, R.; Alzahrani, F.; Kaviarasan, B.; Ren, Y. Mixed H and passivity-based resilient controller for nonhomogeneous Markovian jump systems. Nonlinear Anal. Hybrid Syst. 2019, 31, 86–99. [Google Scholar] [CrossRef]
  3. Cheng, J.; Park, J.H.; Cao, J.; Qi, W. A hidden mode observation approach to finite-time SOFC of Markovian switching systems with quantization. Nonlinear Dyn. 2020, 100, 509–521. [Google Scholar] [CrossRef]
  4. Cheng, J.; Park, J.H.; Zhao, X.; Karimi, H.R.; Cao, J. Quantized Nonstationary Filtering of Networked Markov Switching RSNSs: A Multiple Hierarchical Structure Strategy. IEEE Trans. Autom. Control. 2020, 65, 4816–4823. [Google Scholar] [CrossRef]
  5. Li, H.; Shi, P.; Yao, D.; Wu, L. Observer-based adaptive sliding mode control for nonlinear Markovian jump systems. Automatica 2016, 64, 133–142. [Google Scholar] [CrossRef]
  6. Ma, Y.; Jia, X.; Zhang, Q. Robust finite-time non-fragile memory H control for discrete-time singular Markovian jumping systems subject to actuator saturation. J. Frankl. Inst. 2017, 354, 8256–8282. [Google Scholar] [CrossRef]
  7. Wu, B.; Zhao, Y. Dissipative Control for Fuzzy Singular Markov Jump Systems With State-Dependent Noise and Asynchronous Modes. IEEE Access 2021, 9, 25691–25702. [Google Scholar] [CrossRef]
  8. Qi, W.; Park, J.; Cheng, J.; Chen, X. Stochastic stability and L1-gain analysis for positive nonlinear semi-Markovian jump systems with time-varying delay via TS fuzzy model approach. Fuzzy Sets Syst. 2019, 371, 110–122. [Google Scholar] [CrossRef]
  9. Kavikumar, R.; Sakthivel, R.; Kwon, O.; Kaviarasan, B. Reliable non-fragile memory state feedback controller design for fuzzy Markovian jump systems. Nonlinear Anal. Hybrid Syst. 2020, 35, 100828. [Google Scholar] [CrossRef]
  10. Tian, Y.; Wang, Z. Asynchronous Extended Dissipative Filtering for T-S Fuzzy Markov Jump Systems. IEEE Trans. Syst. Man Cybern. Syst. 2022, 52, 3915–3925. [Google Scholar] [CrossRef]
  11. Li, J.; Zhang, Q.; Yan, X.G.; Spurgeon, S.K. Integral sliding mode control for Markovian jump T-S fuzzy descriptor systems based on the super-twisting algorithm. Iet Control. Theory Appl. 2017, 11, 1134–1143. [Google Scholar] [CrossRef]
  12. Lv, C.; Chen, J.; Lv, X.; Zhang, Z. Finite-time H control for interval Type-2 fuzzy singular systems via switched fuzzy models and static output feedback. Nonlinear Anal. Hybrid Syst. 2022, 45, 101206. [Google Scholar] [CrossRef]
  13. Zhao, T.; Wei, Z.; Dian, S.; Xiao, J. Observer-based H controller design for interval Type-2 T-S fuzzy systems. Neurocomputing 2016, 177, 9–25. [Google Scholar] [CrossRef]
  14. Song, W.; Tong, S. Fuzzy decentralized output feedback event-triggered control for interval Type-2 fuzzy systems with saturated inputs. Inf. Sci. 2021, 575, 639–653. [Google Scholar] [CrossRef]
  15. Alshammari, O.; Kchaou, M.; Jerbi, H.; Ben Aoun, S.; Leiva, V. A Fuzzy Design for a Sliding Mode Observer-Based Control Scheme of Takagi–Sugeno Markov Jump Systems under Imperfect Premise Matching with Bio-Economic and Industrial Applications. Mathematics 2022, 10, 3309. [Google Scholar] [CrossRef]
  16. Wang, S.; Feng, J.; Zhang, H. Robust fault tolerant control for a class of networked control systems with state delay and stochastic actuator failures. Int. J. Adapt. Control. Signal Process. 2014, 28, 798–811. [Google Scholar] [CrossRef]
  17. Latrech, C.; Kchaou, M.; Guéguen, H. Networked non-fragile H static output feedback control design for vehicle dynamics stability: A descriptor approach. Eur. J. Control. 2018, 40, 13–26. [Google Scholar] [CrossRef]
  18. Wang, B.; Chen, W.; Wang, J.; Zhang, B.; Zhang, Z.; Qiu, X. Cooperative Tracking Control of Multiagent Systems: A Heterogeneous Coupling Network and Intermittent Communication Framework. IEEE Trans. Cybern. 2019, 49, 4308–4320. [Google Scholar] [CrossRef]
  19. Li, Q.; Wang, Z.; Sheng, W.; Alsaadi, F.E.; Alsaadi, F.E. Dynamic event-triggered mechanism for H non-fragile state estimation of complex networks under randomly occurring sensor saturations. Inf. Sci. 2020, 509, 304–316. [Google Scholar] [CrossRef]
  20. Chen, M.; Karimi, H.R.; Sun, J. Observer-based finite time H control of nonlinear discrete time-varying systems with an adaptive-event-triggered Mechanism. J. Frankl. Inst. 2020, 357, 11668–11689. [Google Scholar] [CrossRef]
  21. Chu, X.; Li, M. H non-fragile observer-based dynamic-event-triggered sliding mode control for nonlinear networked systems with sensor saturation and dead-zone input. ISA Trans. 2019, 94, 93–107. [Google Scholar] [CrossRef] [PubMed]
  22. Qi, W.; Zong, G.; Zheng, W.X. Adaptive Event-Triggered SMC for Stochastic Switching Systems With Semi-Markov Process and Application to Boost Converter Circuit Model. IEEE Trans. Circuits Syst. I: Regul. Pap. 2021, 68, 786–796. [Google Scholar] [CrossRef]
  23. Zhang, Y.; Shi, P.; Agarwal, R.K.; Shi, Y. Event-Based Dissipative Analysis for Discrete Time-Delay Singular Jump Neural Networks. IEEE Trans. Neural Netw. Learn. Syst. 2020, 31, 1232–1241. [Google Scholar] [CrossRef]
  24. Wang, X.L.; Yang, G.H. Event-triggered fault detection for discrete-time T-S fuzzy systems. ISA Trans. 2018, 76, 18–30. [Google Scholar] [CrossRef] [PubMed]
  25. Song, X.; Men, Y.; Zhou, J.; Zhao, J.; Shen, H. Event-triggered H control for networked discrete-time Markov jump systems with repeated scalar nonlinearities. Appl. Math. Comput. 2017, 298, 123–132. [Google Scholar] [CrossRef]
  26. Chen, Q.X.; Chang, X.H. Resilient filter of nonlinear network systems with dynamic event-triggered mechanism and hybrid cyber-attack. Appl. Math. Comput. 2022, 434, 127419. [Google Scholar] [CrossRef]
  27. Tian, E.; Wang, Z.; Zou, L.; Yue, D. Probabilistic-constrained filtering for a class of nonlinear systems with improved static event-triggered communication. Int. J. Robust Nonlinear Control. 2019, 29, 1484–1498. [Google Scholar] [CrossRef]
  28. Liu, J.; Zhang, N.; Li, Y.; Xie, X. H filter design for discrete-time networked systems with adaptive-event-triggered mechanism and hybrid cyber-attacks. J. Frankl. Inst. 2021, 358, 9325–9345. [Google Scholar] [CrossRef]
  29. Dong, S.; Fang, M.; Shi, P.; Wu, Z.G.; Zhang, D. Dissipativity-Based Control for Fuzzy Systems With Asynchronous Modes and Intermittent Measurements. IEEE Trans. Cybern. 2020, 50, 2389–2399. [Google Scholar] [CrossRef]
  30. Liu, J.; Yin, T.; Cao, J.; Yue, D.; Karimi, H.R. Security Control for T-S Fuzzy Systems With Adaptive Event-Triggered Mechanism and Multiple Cyber-Attacks. IEEE Trans. Syst. Man Cybern. Syst. 2021, 51, 6544–6554. [Google Scholar] [CrossRef]
  31. Hsieh, C.S. Robust two-stage Kalman filters for systems with unknown inputs. IEEE Trans. Autom. Control. 2000, 45, 2374–2378. [Google Scholar] [CrossRef]
  32. Jwo, D.J.; Wang, S.H. Adaptive Fuzzy Strong Tracking Extended Kalman Filtering for GPS Navigation. IEEE Sens. J. 2007, 7, 778–789. [Google Scholar] [CrossRef]
  33. Hamid, K.R.; Talukder, A.; Islam, A.K.M.E. Implementation of Fuzzy Aided Kalman Filter for Tracking a Moving Object in Two-Dimensional Space. Int. J. Fuzzy Log. Intell. Syst. 2018, 18, 85–96. [Google Scholar] [CrossRef]
  34. Zhang, M.; Shi, P.; Liu, Z.; Ma, L.; Su, H. H filtering for discrete-time switched fuzzy systems with randomly occurring time-varying delay and packet dropouts. Signal Process. 2018, 143, 320–327. [Google Scholar] [CrossRef]
  35. Wang, H.; Xue, A. Adaptive event-triggered H filtering for discrete-time delayed neural networks with randomly occurring missing measurements. Signal Process. 2018, 153, 221–230. [Google Scholar] [CrossRef]
  36. Zhang, J.; Peng, C. Event-triggered H filtering for networked Takagi–Sugeno fuzzy systems with asynchronous constraints. IET Signal Process. 2015, 9, 403–411. [Google Scholar] [CrossRef]
  37. Zhang, Y.; Shi, P.; Agarwal, R.K.; Shi, Y. Event-based mixed H and passive filtering for discrete singular stochastic systems. Int. J. Control. 2020, 93, 2407–2415. [Google Scholar] [CrossRef]
  38. Tian, Y.; Wang, Z. Finite-Time Extended Dissipative Filtering for Singular T-S Fuzzy Systems With Nonhomogeneous Markov Jumps. IEEE Trans. Cybern. 2022, 52, 4574–4584. [Google Scholar] [CrossRef]
  39. Shi, P.; Su, X.; Li, F. Dissipativity-Based Filtering for Fuzzy Switched Systems with Stochastic Perturbation. IEEE Trans. Autom. Control. 2016, 61, 1694–1699. [Google Scholar] [CrossRef]
  40. Cheng, J.; Park, J.H.; Chadli, M. Peak-to-peak fuzzy filtering of nonlinear discrete-time systems with Markov communication protocol. Inf. Sci. 2022, 607, 361–376. [Google Scholar] [CrossRef]
  41. Song, J.; Chang, X.H. Finite-Time Peak-To-Peak Filtering for Nonlinear Singular System. IEEE Trans. Circuits Syst. Ii: Express Briefs 2022, 69, 4369–4373. [Google Scholar] [CrossRef]
  42. Kchaou, M.; Regaieg, M.A.; Al-Hajjaji, A. Quantized asynchronous extended dissipative observer-based sliding mode control for Markovian jump TS fuzzy systems. J. Frankl. Inst. 2022, 359, 9636–9665. [Google Scholar] [CrossRef]
  43. Liu, J.; Gu, Y.; Cao, J.; Fei, S. Distributed event-triggered H filtering over sensor networks with sensor saturations and cyber-attacks. ISA Trans. 2018, 81, 63–75. [Google Scholar] [CrossRef] [PubMed]
  44. Zhang, J.; Christofides, P.D.; He, X.; Wu, Z.; Zhang, Z.; Zhou, D. Event-triggered filtering and intermittent fault detection for time-varying systems with stochastic parameter uncertainty and sensor saturation. Int. J. Robust Nonlinear Control. 2018, 28, 4666–4680. [Google Scholar] [CrossRef]
  45. Wu, Y.; Cheng, J.; Wu, Z.G. Fuzzy-Affine-Model-Based Filtering Design With Memory-Based Dynamic Event-Triggered Protocol. IEEE Trans. Fuzzy Syst. 2022, 1–11. [Google Scholar] [CrossRef]
  46. Peng, C.; Zhang, J.; Yan, H. Adaptive Event-Triggering H Load Frequency Control for Network-Based Power Systems. IEEE Trans. Ind. Electron. 2018, 65, 1685–1694. [Google Scholar] [CrossRef]
  47. Gu, Z.; Yue, D.; Liu, J.; Ding, Z. H tracking control of nonlinear networked systems with a novel adaptive-event-triggered communication scheme. J. Frankl. Inst. 2017, 354, 3540–3553. [Google Scholar] [CrossRef]
  48. Zhang, Z.; Liang, H.; Wu, C.; Ahn, C.K. Adaptive Event-Triggered Output Feedback Fuzzy Control for Nonlinear Networked Systems With Packet Dropouts and Actuator Failure. IEEE Trans. Fuzzy Syst. 2019, 27, 1793–1806. [Google Scholar] [CrossRef]
  49. Chang, X.H.; Liu, Y. Robust H Filtering for Vehicle Sideslip Angle With Quantization and Data Dropouts. IEEE Trans. Veh. Technol. 2020, 69, 10435–10445. [Google Scholar] [CrossRef]
  50. Xia, W.; Zheng, W.X.; Xu, S. Event-triggered filter design for Markovian jump delay systems with nonlinear perturbation using quantized measurement. Int. J. Robust Nonlinear Control. 2019, 29, 4644–4664. [Google Scholar] [CrossRef]
  51. Li, F.; Cao, X.; Zhou, C.; Yang, C. Event-triggered asynchronous sliding mode control of CSTR based on Markov model. J. Frankl. Inst. 2021, 358, 4687–4704. [Google Scholar] [CrossRef]
  52. Chu, X.; Li, M. H observer-based event-triggered sliding mode control for a class of discrete-time nonlinear networked systems with quantizations. ISA Trans. 2018, 79, 13–26. [Google Scholar] [CrossRef] [PubMed]
  53. Ahmad, I.; Ge, X.; Han, Q.L. Decentralized Dynamic Event-Triggered Communication and Active Suspension Control of In-Wheel Motor Driven Electric Vehicles with Dynamic Damping. IEEE/CAA J. Autom. Sin. 2021, 8, 971–986. [Google Scholar] [CrossRef]
  54. Pan, Y.; Yang, G.H. Event-based output tracking control for fuzzy networked control systems with network-induced delays. Appl. Math. Comput. 2019, 346, 513–530. [Google Scholar] [CrossRef]
  55. Shen, H.; Jiao, S.; Huo, S.; Chen, M.; Li, J.; Chen, B. On energy-to-peak filtering for semi-Markov jump singular systems with unideal measurements. Signal Process. 2018, 144, 127–133. [Google Scholar] [CrossRef]
  56. Tao, J.; Xiao, Z.; Li, Z.; Wu, J.; Lu, R.; Shi, P.; Wang, X. Dynamic Event-Triggered State Estimation for Markov Jump Neural Networks With Partially Unknown Probabilities. IEEE Trans. Neural Netw. Learn. Syst. 2022, 33, 7438–7447. [Google Scholar] [CrossRef]
  57. Zhang, B.; Zheng, W.X.; Xu, S. Filtering of Markovian Jump Delay Systems Based on a New Performance Index. IEEE Trans. Circuits Syst. Regul. Pap. 2013, 60, 1250–1263. [Google Scholar] [CrossRef]
  58. Shen, Y.; Wu, Z.G.; Shi, P.; Shu, Z.; Karimi, H.R. H control of Markov jump time-delay systems under asynchronous controller and quantizer. Automatica 2019, 99, 352–360. [Google Scholar] [CrossRef]
  59. Chen, J.; Lu, J.; Xu, S. Summation inequality and its application to stability analysis for time-delay systems. IET Control. Theory Appl. 2016, 10, 391–395. [Google Scholar] [CrossRef]
  60. Hamidi, F.; Aloui, M.; Jerbi, H.; Kchaou, M.; Abbassi, R.; Popescu, D.; Ben Aoun, S.; Dimon, C. Chaotic Particle Swarm Optimisation for Enlarging the Domain of Attraction of Polynomial Nonlinear Systems. Electronics 2020, 9, 1704. [Google Scholar] [CrossRef]
  61. Moughamir, S.; Zaytoon, J.; Manamanni, N.; Afilal, L. A system approach for control development of lower-limbs training machines. Control. Eng. Pract. 2002, 10, 287–299. [Google Scholar] [CrossRef]
  62. Kaviarasan, B.; Kwon, O.M.; Park, M.J.; Sakthivel, R. Reduced-order filtering for semi-Markovian jump systems against randomly occurring false data injection attacks. Appl. Math. Comput. 2023, 444, 127832. [Google Scholar] [CrossRef]
  63. Wu, Z.; Chen, J.; Zhang, X.; Xiao, Z.; Tao, J.; Wang, X. Dynamic event-triggered synchronization of complex networks with switching topologies: Asynchronous observer-based case. Appl. Math. Comput. 2022, 435, 127413. [Google Scholar] [CrossRef]
Figure 1. The framework of filtering system under deception attacks.
Figure 1. The framework of filtering system under deception attacks.
Mathematics 11 02064 g001
Figure 2. z ( k ) and its estimation z ^ ( k ) (a) and the release instants and release interval (b), for Case I.
Figure 2. z ( k ) and its estimation z ^ ( k ) (a) and the release instants and release interval (b), for Case I.
Mathematics 11 02064 g002
Figure 3. z ( k ) and its estimation z ^ ( k ) (a) and the release instants and release interval (b), for Case II.
Figure 3. z ( k ) and its estimation z ^ ( k ) (a) and the release instants and release interval (b), for Case II.
Mathematics 11 02064 g003
Figure 4. z ( k ) and its estimation z ^ ( k ) (a) and the release instants and release interval (b), for Case III.
Figure 4. z ( k ) and its estimation z ^ ( k ) (a) and the release instants and release interval (b), for Case III.
Mathematics 11 02064 g004
Figure 5. z ( k ) and its estimation z f ( k ) (a) and the release instants and release interval (b), for Case IV.
Figure 5. z ( k ) and its estimation z f ( k ) (a) and the release instants and release interval (b), for Case IV.
Mathematics 11 02064 g005
Figure 6. A possible sequence of the system mode (a) and the states of measurements (b).
Figure 6. A possible sequence of the system mode (a) and the states of measurements (b).
Mathematics 11 02064 g006
Figure 7. Adaptive variable using the proposed method (a) and the AET mechanism in [48] (b).
Figure 7. Adaptive variable using the proposed method (a) and the AET mechanism in [48] (b).
Mathematics 11 02064 g007
Figure 8. Lower limbs rehabilitation system.
Figure 8. Lower limbs rehabilitation system.
Mathematics 11 02064 g008
Figure 9. Simulation results based on the proposed AETM (a) and simulation results based on the AETM in [35] (b).
Figure 9. Simulation results based on the proposed AETM (a) and simulation results based on the AETM in [35] (b).
Mathematics 11 02064 g009
Figure 10. Simulation results based on the AETM in [48] (a) and simulation results based on the AETM in [53] (b).
Figure 10. Simulation results based on the AETM in [48] (a) and simulation results based on the AETM in [53] (b).
Mathematics 11 02064 g010
Figure 11. Simulation results based on the AETM in [54] (a) and a possible sequence of the system mode and the states of measurements (b).
Figure 11. Simulation results based on the AETM in [54] (a) and a possible sequence of the system mode and the states of measurements (b).
Mathematics 11 02064 g011
Table 1. Abbreviations, acronyms, and notations used in the present document.
Table 1. Abbreviations, acronyms, and notations used in the present document.
SymbolDefinition
R set of real numbers
ndimension of the Euclidean space
X R n × m n × m real matrix
X > 0 real symmetric positive definite matrix X
X norm of the matrix X
X transpose of the matrix X
sym ( X ) X + X
*term that is induced by symmetry of a matrix
λ max ( ) the maximal eigenvalue of a matrix
E mathematical expectation
π p q = P ( r k + 1 = q | r ¯ k = p ) transition probability from states p to q
rnumber of if–then rules
r ¯ k discrete-time Markov process
LMIlinear matrix inequalities
MJSMarkovian jump systems
NCSnetworked control systems
ETevent-triggered
T-S Takagi–Sugeno
IT-2interval Type-2
Table 2. Minimal values for different performances.
Table 2. Minimal values for different performances.
Performance Ω 1 Ω 2 Ω 3 Ω 4 a 1 * a 2 * b 1 * b 2 * γ *
H  −10 γ 2 014.3165−8.429514.5129−9.48000.7327
passivity01 γ 010.0000−8.000014.5663−10.00000.1201
dissipativity−11 γ 010.6384−8.000012.7780−10.0000 0.1238
Table 3. Data transmission rate, ISE, and IAE for different cases.
Table 3. Data transmission rate, ISE, and IAE for different cases.
Filter Gains(65)(66)(67)[34]
Data transmission rate14.17213.57312.57518.563
ISE1.51521.48950.943088.7833
IAE2.90012.85462.49045.8065
Table 4. Markov mode parameters of the system.
Table 4. Markov mode parameters of the system.
ParameterPhysical MeaningValueMode 1Mode 2Unit
aGravitational coefficient110--(N)
bGravitational coefficient31--(N)
lArm’s length 0.5 --(m)
f m Viscous friction 103.6 --(N(rad/s) 1 )
k m Coriolis coefficient [ 70 , 80 ] --(Nm(rad/s) 1 )
J m inertia-33.835.2(kg m 2 )
Table 5. Number and rate of transmitted data packets and IAE for different event-triggered mechanisms.
Table 5. Number and rate of transmitted data packets and IAE for different event-triggered mechanisms.
Event-Triggered MechanismPackets TransmittedData Transmission Rate (%)IAE (%)
Proposed122.991.69
[35]204.981.74
[48]143.491.67
[53]194.741.81
[54]266.481.67
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Kchaou, M.; Regaieg, M.A. Event-Triggered Extended Dissipativity Fuzzy Filter Design for Nonlinear Markovian Switching Systems against Deception Attacks. Mathematics 2023, 11, 2064. https://doi.org/10.3390/math11092064

AMA Style

Kchaou M, Regaieg MA. Event-Triggered Extended Dissipativity Fuzzy Filter Design for Nonlinear Markovian Switching Systems against Deception Attacks. Mathematics. 2023; 11(9):2064. https://doi.org/10.3390/math11092064

Chicago/Turabian Style

Kchaou, Mourad, and Mohamed Amin Regaieg. 2023. "Event-Triggered Extended Dissipativity Fuzzy Filter Design for Nonlinear Markovian Switching Systems against Deception Attacks" Mathematics 11, no. 9: 2064. https://doi.org/10.3390/math11092064

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop