期刊
IEEE TRANSACTIONS ON FUZZY SYSTEMS
卷 31, 期 9, 页码 2929-2942出版社
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TFUZZ.2023.3239732
关键词
Artificial neural networks; State estimation; Estimation error; Encryption; Time measurement; Neurons; Measurement uncertainty; Nonfragile control; outlier resistant; reaction-diffusion terms; Takagi-Sugeno (T-S) fuzzy neural networks
This article focuses on a new outlier-resistant non-fragile control issue for a class of Takagi-Sugeno fuzzy delayed neural networks with reaction-diffusion terms. The proposed models consider fuzzy control rules and reaction-diffusion phenomenon simultaneously, making them more practical. A state estimator scheme is presented to mitigate the negative effects of abnormal interference, and a design strategy of an outlier-resistant nonfragile state estimator is put forward using decoupling techniques. The obtained theoretical results are applied to image encryption, demonstrating the feasibility and effectiveness of the presented encryption scheme.
This article focuses on a new outlier-resistant non -fragile control issue for a class of Takagi-Sugeno fuzzy delayed neural networks with reaction-diffusion terms. Compared with the existing delayed neural networks, fuzzy control rules and reaction- diffusion phenomenon are considered simultaneously, which makes the proposed models more practical. Furthermore, when subjected to abnormal interference, measurement outputs result in measurement outliers. In order to mitigate the negative effects on the estimation error, a state estimator scheme is presented by introducing a saturation function. By using an appropriate Lyapunov- Krasovskii functional and with the help of a free-weighting matrix, sufficient conditions can be deduced to guarantee the asymptotical stability and prescribed H-8 performance index of the disturbance attenuation of the estimation error. Next, a design strategy of an outlier-resistant nonfragile state estimator is put forward by employing some decoupling techniques. An illustrative example is exploited to illustrate the validity and feasibility of the proposed state estimator. Finally, the obtained theoretical results are applied to image encryption. The experimental analysis demonstrates that the presented encryption scheme is feasible and effective.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据