Azmi, Hadi Yazdizadeh, Alireza
Published in
ISA transactions
This paper introduces a novel robust adaptive fault detection and diagnosis (FDD) observer design approach for a class of nonlinear systems with parametric uncertainty, unknown system fault and time-varying internal delays. The conditions for the existence of the proposed FDD are obtained based on the well-known Linear Matrix Inequalities (LMI) tec...
Rostamzadeh-Renani, Mohammad Baghoolizadeh, Mohammadreza Rostamzadeh-Renani, Reza Toghraie, Davood Ahmadi, Basir
Published in
ISA transactions
Canard is a cutting-edge aerodynamic attachment for lowering the vehicle's drag coefficient by efficiently directing the airflow as well as reducing the lift coefficient by enhancing down-force. This paper aims to simulate the airflow crossing over the car to investigate the effect of canards' geometric design on the rear-body wake using the applic...
Keighobadi, Javad Xu, Bin Alfi, Alireza Arabkoohsar, Ahmad Nazmara, Gholamreza
Published in
ISA transactions
In the framework of the backstepping algorithm, this article proposes a new function approximation technique (FAT)-based compound learning control law for electrically-driven robotic manipulators with output constraint. The Fourier series expansion is adopted in the learning-based design to approximate unknown terms in the system description. The a...
Liu, Dongchen Wang, Junzheng Lei, Tao Wang, Shoukun
Published in
ISA transactions
This work presents a dynamic posture tracking control strategy for wheel-legged systems on uneven surfaces. Based on the kinematic model of a wheel-legged robotic system, the expected positions for the end-effectors of wheel-legs are calculated according to posture references and sensor feedback. The position control problem for a general wheel-leg...
Huang, Keke Zhang, Li Sun, Bei Liang, Xiaojun Yang, Chunhua Gui, Weihua
Published in
ISA transactions
Industrial cyber-physical system (ICPS), by its powerful computing, communication, precise control and remote operation functions, has become the mainstream of modern industrial process. The observed variables of the closed-loop process in ICPS are subject to the degradation of equipment and other factors, resulting in exhibiting a stationary/nonst...
Yang, Xiao-Yan Zhang, Yu-Chen Song, Shen-Min
Published in
ISA transactions
In this study, two nonsingular three-dimensional (3D) guidance strategies to intercept a stationary target with desired impact angles, subject to nonlinear coupled dynamics, field-of-view (FOV) limit and lateral acceleration bounds, are investigated. As a stepping stone, two novel sliding mode surfaces are designed, the convergence and boundedness ...
Zhu, Yunru Huang, Qi Wu, Jiahui Zheng, Yuanshi Wang, Huaizhu
Published in
ISA transactions
This paper studies the resilient group consensus of continuous-time second-order multi-agent systems (MASs) with malicious agents. Adopting the idea that each normal agent ignores the most extreme values from neighbors, synchronous resilient impulsive algorithm based on sampled data is proposed for normal agents with bounded communication delays to...
Zhou, Xia Chen, Lulu Cao, Jinde Cheng, Jun
Published in
ISA transactions
This correspondence analyses the issue of asynchronous filtering for discrete-time Markov switched repeat scalar nonlinear systems under the deception attacks. Aiming to economize on the finite network bandwidth, a novel event-triggered try-once-discard protocol is presented. At the same time, the hidden Markov model with partial information is con...
Kürkçü, Burak Kasnakoğlu, Coşku Efe, Mehmet Önder Su, Rong
Published in
ISA transactions
In this paper, the existence of a solution for the transformation of the disturbances from the unmatched cases to the matched one is investigated. The usage of matched/unmatched disturbance notions and the underlying assumptions are clarified. Then, a simplified definition is introduced to obtain a set of performance metrics to be used in observer ...
Yang, Fan Gu, Zhou Hua, Lingzhi Yan, Shen
Published in
ISA transactions
Wireless vehicle-to-vehicle communication brings inevitable imperfections. This work simultaneously addresses the resource utilization and security issues for a vehicle platoon. Inspired by the modeling of denial of service attacks, a novel queuing model is constructed to depict false data injection attacks. A switched event-triggered mechanism is ...