Abstract: This article presents a predefined-time reliable control strategy with prescribed performance for tracking control of robotic systems with actuator faults and parametric uncertainties. A ...
Abstract: Nonlinear affine systems with relative degree two widely exist in the control field, and the unified output tracking control approach of these systems is still an open problem. This paper ...
Abstract: This paper investigates the problem of fault-tolerant control for output regulation in multi-agent systems with actuator multiplicative faults. Initially, a prescribed-time observer is ...
Learn why deterministic PLC logic remains essential in smart manufacturing, and how context-aware AI can enhance, not replace ...
Go beyond data sovereignty promises to proof with five CSO controls: zero-trust, local keys, logs, validation and third-party ...
NOVA, a deep-tech subsidiary of e2E Transportation Infrastructure, has also entered into a strategic partnership with Tata ...
Abstract: A neural network adaptive quantized predefined-time control problem is studied for switching stochastic nonlinear systems with full-state error constraints ...
Abstract: This article addresses the problem of distributed fuzzy adaptive pinning control for multiagent systems with output saturation via adopting the dynamic event-triggered mechanism. With the ...
Abstract: Inverse reinforcement learning optimal control is under the framework of learner–expert, the learner system can learn expert system's trajectory and optimal control policy via a ...
Abstract: Numerous uncertainties in practical production and operation can seriously affect the drive performance of permanent magnet synchronous machines (PMSMs). Various robust control methods have ...
Abstract: This paper explores the fixed-time tracking control problem for fractional-order nonlinear systems with full state constraints. A novel fixed-time tracking control strategy is proposed for ...
Abstract: With the development of cyber-physical systems, system security faces more risks from cyber-attacks. In this work, we study the problem that an external attacker implements covert sensor and ...