期刊
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS
卷 68, 期 3, 页码 2491-2500出版社
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TIE.2020.2975498
关键词
Synchronization; Switches; Topology; Network topology; Delays; Artificial neural networks; Event triggered; impulsive control; multiple neural networks (MNNs); switching topology; synchronization
资金
- Natural Science Foundation of China [61976085, 61603129, 61841301, 61936004, 61673188]
- Innovation Group Project of the National Natural Science Foundation of China [61821003]
- Foundation for Innovative Research Groups of Hubei Province of China [2017CFA005]
- 111 Project on Computational Intelligence and Intelligent Control [B18024]
This article proposes an event-triggering impulsive control strategy for synchronization of multiple neural networks, avoiding Zeno behavior. It discusses the synchronization problems of a MDNN with delay and a directed disconnected switching topology. The study also considers jointly connected and pure impulsive control protocol cases, providing theoretical analysis through a numerical example.
In this article, an event-triggering impulsive control strategy is proposed, in which the impulsive time sequence can be different from the event-triggered time sequence. The synchronization problems of a multiple neural network with delay (MDNN) and the directed disconnected switching topology are discussed by using this strategy. The considered switching topology is assumed to be directed and sequentially or jointly connected. The combined measurement method is adopted in the event-triggering strategy, so that each delayed neural network only updates the control rules at the moment of its event triggering. First, we prove that the designed event-triggering rules can avoid Zeno behavior. Then, the sufficient conditions of event-based quasi-synchronization (synchronization) for the MDNN can be obtained by using the iterative method. In addition, as an extension, the case of a jointly connected topology and the case of a pure impulsive control protocol are considered, too. Finally, a numerical example is provided to test the results in theory analysis.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据