Journal
IEEE TRANSACTIONS ON FUZZY SYSTEMS
Volume 31, Issue 3, Pages 930-940Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TFUZZ.2022.3193757
Keywords
Delays; Synchronization; Artificial neural networks; Kernel; Time-varying systems; Probabilistic logic; Delay effects; Distributed delay; neural networks (NNs); probabilistic communication delay; synchronization; Takagi-Sugeno (T-S) fuzzy system
Ask authors/readers for more resources
In this article, the design of fuzzy synchronization controller for T-S fuzzy neural networks with distributed time-varying delay and probabilistic network communication delay is studied. A more general model containing a distributed delay kernel is considered. By utilizing the probability distribution of random communication delays, a distributed but deterministic delay model is established. New sufficient conditions for the existence of a synchronization controller are presented by developing a new Lyapunov-Krasovskii functional related to the distributed delay kernels and using an integral inequality. Numerical simulation and an application of encrypting the image are carried out to illustrate the effectiveness of the developed strategy.
In this article, we study the design of fuzzy synchronization controller of Takagi-Sugeno (T-S) fuzzy neural networks with distributed time-varying delay and probabilistic network communication delay. Compared with the existing model of neural networks with distributed time-varying delay without kernel, a more general model containing a distributed delay kernel is considered. By utilizing the probability distribution of random communication delays, a distributed but deterministic delay model is established. In this model, the delay probability density function is treated as the distributed delay kernel. By developing a new Lyapunov-Krasovskii functional related to the distributed delay kernels and using an integral inequality, new sufficient conditions for the existence of a synchronization controller are presented. Finally, a numerical simulation and an application of encrypting the image are carried out to illustrate the effectiveness of the developed strategy.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available