You are on page 1of 6

Proceedings of the 19th World Congress

The International Federation of Automatic Control


Cape Town, South Africa. August 24-29, 2014

Event-Triggered Control Over Noisy


Feedback Channels ?
Liangyin Zhang ∗ , Michael Z. Q. Chen ∗ , Chanying Li ∗∗ ,
and Zhan Shu ∗∗∗

Department of Mechanical Engineering, The University of Hong
Kong, Pokfulam Road, Hong Kong (e-mails: leonzly@hku.hk,
mzqchen@hku.hk).
∗∗
National Center for Mathematics and Interdisciplinary Sciences,
Chinese Academy of Sciences, Beijing 100090, China (e-mail:
cyli@amss.ac.cn).
∗∗∗
Electro-Mechanical Group, Faculty of Engineering and The
Environment, University of Southampton, UK SO17 1BJ (e-mail:
z.shu@soton.ac.uk).

Abstract: In this paper, the stability of a discrete-time event-triggered control system over
noisy feedback channels is analyzed. The transmission between the controller and the actuator
is triggered by an event involving estimated control, desirable control, and a trigger threshold.
It is revealed that if the trigger threshold is less than a bound determined by the system
and controller matrices, then the closed-loop system is mean square stable. In addition, two
equivalent conditions based on algebraic Riccati inequality/equation (ARI/ARE) are proposed
to facilitate further analysis.

Keywords: Event-triggered control; Noisy channels; Bounded Real Lemma; ARI; ARE.

1. INTRODUCTION in the past decade. It has been verified by researchers


that this new control technology can prevent unnecessary
In the increasingly popular networked control systems samplings as well as information transmissions and require
(NCS) (Xiong and Lam [2007]), the sensors, controllers, less control updates than the traditional periodic control.
and actuators are usually geographically dispersed, and Consequently, the implementation cost can be reduced for
the entire system is implemented with limited energy and the control of NCSs. The ETC theory is first systematically
communication resources, which poses a big challenge to studied in Tabuada [2007]. It is based on the Liapunov
feedback control design. In order to reduce the demand stability theory so that the control renders the closed
on energy consumption and communication while main- system input-to-state (ISS) stable (Sontag [2008]). With
taining satisfactory closed-loop stability and performance, this stabilizing ETC law, the event rule is guaranteed to be
developing new control theory and technology would be legitimate, meaning that the inter-sampling time is lower
necessary. One possible solution to the problem is to bounded and only a finite number of events can occur
use the so-called event-trigger strategy (Tabuada [2007]), in a finite interval of time. In other words, accumulative
which originates from the research on aperiodic sampling. events known as the Zeno behavior (Ames et al. [2006])
The study of aperiodic sampling can be traced back to will not happen. Such kind of “legitimacy”, which is also
the 1960s (Gupta [1963]). However, the technique had not mentioned in Kofman [2003], depends on the assumption
received enough attention for many years until the late that the state estimation error is zero at the sampling
1990s (Åström and Bernhardsson [1999, 2002]). In Åström instant. The event-trigger strategy is applied to some
and Bernhardsson’s work, it has been revealed that better wireless sensor/actuator networks and generalized to a
performance is likely to be achieved with aperiodic sam- decentralized form in Mazo and Tabuada [2011]. The local
pling. Furthermore, a special Lebesgue sampling based on triggering conditions are introduced while the assumption
hysteretic quantization, called the level-crossing sampling, that the state estimation error is zero at the sampling
has recently been proposed in Kofman [2003], Kofman and instant does not hold anymore. To ensure the “legitimacy”,
Braslavsky [2006]. a minimum time τmin is set instead of being provided
by the local triggering rule itself. If a new event occurs
The resurgence of research on event-based sampling has within the minimum time τmin , it is ignored and the next
led to the gradually forming event-triggered control (ETC) updating time can be excited only after time interval τmin .
Meanwhile, the distributed ETC of NCSs is systematically
? This research was partially supported by the Hong Kong Univer-
analyzed in Wang and Lemmon [2011]. Besides, the ETC
sity Committee on Research and Conference Grants under Grant under data-rate communication constraints is studied in
201111159110 and the National Natural Science Foundation of Li et al. [2012], relating ETC to the data rate problem
China under Grants 61374053 and 61203067. Corresponding author:
Michael Z. Q. Chen.
(Nair and Evans [2004], Tatikonda and Mitter [2004]).

978-3-902823-62-5/2014 © IFAC 10493


19th IFAC World Congress
Cape Town, South Africa. August 24-29, 2014

Recently, the periodic event-triggered control (PETC) has


been proposed in Heemels and Donkers [2013], Heemels
et al. [2013]. This scheme combines the advantages of both
ETC and traditional periodic control. In ETC, “legiti-
macy” has to be ensured either inherently, or by forcing a
τmin value when system disturbance or the decentralization
is considered. Besides, the event-triggering conditions need
to be checked all the time. In PETC, traditional periodic
sampling is preserved while the transmission of feedback
information is event-triggered. The inter-update time is
naturally lower bounded by sampling period and the event-
triggering conditions only need to be checked at sampling
instants. Between two consecutive feedback transmissions, Fig. 1. Event-triggered control over noisy channels.
such open loop schemes as constant control and model-
based control can be adopted. Then, the PETC system
is modeled as the discrete-time ETC. Related results on 2. PROBLEM FORMULATION
nonlinear systems can be found in Eqtami et al. [2010].
2.1 Event-Trigger Strategy
In this paper, we investigate the closed-loop stability of
a discrete-time event-triggered control system over noisy The event-triggered feedback configuration considered in
channels. In the presence of channel noise, the error this paper is depicted in Fig. 1, which is the following
between estimated control and desirable control is not discrete-time system:
zero at the updating instant if the control is the channel xm+1 = Axm + Bum ; um = rk , tk ≤ m < tk+1 ;
input and constant control law is adopted when there is no (1)
rk = sk + nk ; sk = −Kx(tk ), (A − BK) is Schur.
transmission. We will show that if proper event-trigger is
designed, the closed-loop stability can still hold. Based on Here, A ∈ Rnx ×nx , B ∈ Rnx ×nc , K ∈ Rnc ×nx ; x ∈ Rnx ,
the robust control theory, a sufficient condition for closed- u, r, s, n ∈ Rnc ; m = 0, 1, 2, ... are the discrete-time steps;
loop stability in a mean square sense is established. A and {tk } ⊂ {0, 1, 2, ...} with t0 = 0 is the sequence of the
highlight of the obtained results is that the tuning rule for updating time, which is generated by the event-trigger.
parameters can be identified in a straightforward manner. The initial state x0 can either be treated as a random
The rest of the paper is organized as follows. In Section 2, vector with bounded E{kx0 k2 }; or as a deterministic
the event-trigger strategy, together with an perturbed lin- real vector, with the expectation E{kx0 k2 } being kx0 k2
ear model, for the control over noisy channels is formu- itself. At each updating time m = tk , the control signal
lated. In Section 3, the perturbed linear model is modified is transmitted by the controller as the sending message
to an augmented perturbed linear model with some scalar sk , and disturbed by the additive channel noise nk , then
conditions. Then, based on the robust control theory, a received by the actuator as rk . Before the next updating
sufficient condition is given for the existence of a Liapunov time, the received signal rk is stored in the actuator and
function. Subsequently, the closed-loop stability is estab- the constant control law is adopted.
lished. In addition, two equivalent ARI/ARE conditions Assumption 1. The pair (A, B) is assumed stabilizable
are proposed in Section 4 to facilitate further analysis. such that K exists to render (A − BK) Schur.
Finally, conclusions are drawn in Section 5. Assumption 2. The additive channel noises {nk } are in-
Nomenclature: Throughout this paper, the common dependent and identically distributed, zero mean, and
probability space for all random variables is denoted by with covariance matrix being diagonal and satisfying that
(Ω, F , P); the expectation operator is denoted by E{·}; σ 2 I  E{nk · nTk } for some constant σ > 0.
for a sequence {sm }, sm is also denoted by s(m); Rp Definition 1. [Nair and Evans, 2004, (2.5)] System (1) is
and Rp×q represent the p-dimensional real vector space said to be stabilized in the mean square sense by the event-
and the set of all p × q real matrices, respectively; for triggered mechanism with the controller −K if
a general complex matrix M , M ∗ and M T denote the sup E{kxm k2 } < +∞.
conjugate transpose and the transpose of M , respectively; m∈N
a square matrix X is Hermitian if X = X ∗ ; the largest The event-trigger strategy considered in this paper is based
and the smallest eigenvalues of Hermitian X are denoted on the estimated control {ûm } and the desirable control
by λmax (X) and λmin p (X), respectively; kM k denotes the {ũm }, which will be defined in the following.
spectral norm, i.e., λmax (M ∗ M ), of a general matrix M ;
I (respectively, 0) denotes the identity (respectively, zero) We start at t0 , 0 and set the initial estimated control as
matrix with compatible dimension; for two Hermitian û0 , 0. For m ∈ N, we denote ξm , [xTm (ûm )T ]T , define
matrices X and Y , the notation X  Y (respectively, the desirable control as ũm , −Kxm , and the triggering
X  Y ) means that X − Y is positive semi-definite function as C(ξm ) , kûm − ũm k2 − λ2 kũm k2 = ξmT
Qξm ,
(respectively, positive definite); a square matrix A is where λ > 0 is the trigger threshold, and
defined to be Schur if all its eigenvalues locate within
 
(1 − λ2 )K T K K T
the open unit disc; for a discrete-time system transfer Q, .
K I
matrix G(z), the H∞ norm is denoted by kGk∞ satisfying
kGk∞ = supω∈[−π,π] kG(ejω )k. Then, the event-triggering condition is designed as
kûm − ũm k2 ≥ λ2 kũm k2 , i.e., C(ξm ) ≥ 0. (2)

10494
19th IFAC World Congress
Cape Town, South Africa. August 24-29, 2014

The event-trigger strategy is then formulated in the fol- 3.1 Augmented Perturbed Linear Model
lowing algorithm.
Before proceeding, we introduce a lemma which will be
Algorithm 1:
used in the sequel.
Step 1. At the beginning of each updating process, m = tk , Lemma 1. (Special case of Bounded Real Lemma (BRL),
k ≥ 0, C(ξ(tk )) = kû(tk ) − ũ(tk )k2 − λ2 kũ(tk )k2 ≥ 0, see Ionescu et al. [1999].) For matrices A and B with
the event-triggering condition is satisfied, so the desirable compatible dimensions, let γ > 0 and G(z) , (zI −
control ũ(tk ) is transmitted as the channel input sk , and A)−1 B be given. Then, the following three statements are
received by the actuator as rk = sk + nk . Then, rk is equivalent:
adopted as the true control um for the plant. The next
estimated control û(tk + 1) is set as (BRLs1). A is Schur and kGk∞ < γ.
û(tk + 1) , −Kx(tk ) . (BRLs2). The discrete-time definite constrained algebraic
Riccati equation (ARE)
Step 2. If C(ξ(tk + 1)) ≥ 0, then set tk+1 , tk + 1.
AT XA−X +I −AT XB(−γ 2 I +B T XB)−1 B T XA = 0 (6)
Step 3. If C(ξm ) < 0 for m ≥ tk + 1 before the next
has a unique stabilizing solution X  0 under the definite
triggering time, then keep both the true control and the
constraint γ 2 I − B T XB  0, that is, (A − B(−γ 2 I +
estimated control unchanged,
B T XB)−1 B T XA) is Schur, and there exist V, W such that
um = um−1 = rk , ûm+1 , ûm = −Kx(tk ). 
X − I − AT XA −AT XB
  T
W
When for some m > tk + 1, C(ξm ) ≥ 0, the trigger event = [W V ]  0.
−B T XA γ 2 I − B T XB VT
occurs, and this m is detected as tk+1 .
(BRLs3). There exists X  0 solving the linear matrix
Step 4. A new updating cycle begins, go to Step 1. If finite
inequality (LMI)
tk+1 does not exist, we denote tk+1 = +∞.  
X − I − AT XA −AT XB
 0.
−B T XA γ 2 I − B T XB
2.2 “Perturbed Linear Model”
In the following theorem, we present a sufficient condition
Define the noise sequence {dm } as for the existence of quadratic Liapunov functions.
dm = nk , tk ≤ m < tk+1 ; E{kdm k2 } = nc σ 2 . (3) Theorem 2. Consider system (4) subject to Assumption 1.
For any K such that Ap , A − BK is Schur, if the trigger
Following the perturbed linear model in Heemels and threshold λ satisfies
Donkers [2013], which ignores the channel noise, we can 1
rephrase the event-trigger strategy for control over noisy 0<λ< , (7)
kKk · kGk∞
channels described in Section 2.1 as:
where G(z) , (zI − Ap )−1 B, then there exist parameters
xm+1 = (A − BK)xm + Bdm + Bwm , (4)
γ, θ > 0 such that
where 1 1 1
λθkKk < 1, + 2 < . (8)

dm−1 , if kûm − ũm k < λkũm k; θ2 γ kGk2∞
dm = Furthermore, there exist a positive definite matrix P and
a new random variable, otherwise.
parameters ε > 0,
ũm = −Kxm , û0 = 0, and c2 , λmax (P ), and c1 , λmin (P ) > 0, (9)

ũm , if kûm − ũm k ≥ λkũm k; such that for the Liapunov function V (x) , xT P x, the
ûm+1 =
ûm , if kûm − ũm k < λkũm k. following inequalities hold
V (xm+1 ) − V (xm ) ≤ −εkxm k2 + εθ2 kwm k2 + εγ 2 kdm k2 ,
and the perturbed variable wm is introduced as (10)

wm =
0, if kûm − ũm k ≥ λkũm k; c1 kxk2 ≤ V (x) ≤ c2 kxk2 . (11)
ûm − ũm , if kûm − ũm k < λkũm k.
Proof. First, the augmented perturbed linear model is
Thus, in perturbed linear model (4) of the event-triggered presented as follows. We introduce an auxiliary parameter
control, the perturbed term wm satisfies γp > 0, and denote
" γ #
kwm k ≤ λkũm k ≤ (λkKk)kxm k. (5) γp d m
 
γp γp
Ap , A−BK, Bp , B B , vm , θ . (12)
γ θ γp wm
3. STOCHASTIC STABILITY RESULTS
Then, system (4) of the perturbed linear model of the
In this section, the perturbed linear model is modified to discrete-time event-triggered control over noisy channels
an augmented perturbed linear model with some scalar can be modified as an augmented perturbed linear model
conditions, which plays a vital role in demonstrating the xm+1 = Ap xm + Bp vm . (13)
existence of Liapunov functions in Theorem 2. Based
on the result, the closed-loop stability is established in Next, we study kGp k∞ , which is the following finite H∞
Theorem 3. norm of Gp (z) , (zI − Ap )−1 Bp ,

10495
19th IFAC World Congress
Cape Town, South Africa. August 24-29, 2014

−1
kGp k∞ = kG∗p k∞ = sup BpT e−jω I − ATp
which is equivalent to (16). When γ and θ are fixed, (19)
becomes an LMI, which can be solved efficiently and

ω
r 
−1  reliably by existing algorithms (Boyd and Vandenberghe
= sup λ1 (ejω I − Ap )−1 Bp BpT e−jω I − ATp [2004]). As discussed in Heemels and Donkers [2013], there
ω may exist a Pareto optimal curve (Boyd and Vandenberghe
r
1 1 [2004]) of (γ, θ) for which LMI (19) is feasible, and a heuris-
= γp + 2 · kGk∞ , tic method may be used to find the curve. However, tuning
θ2 γ
where kGk∞ is the finite H∞ norm of G(z) = (zI − the two parameters γ and θ to ensure the feasibility of (19)
Ap )−1 B, and the last equality results from the fact that may not be an easy task. While in Theorem 2, a simple
scalar tuning rule for (γ, θ) is proposed in condition (8), or

γp γp
  γp T  equivalently (18), which can guide the design of the value
T B
Bp Bp = B B · γθp T of the trigger threshold λ.
θ γ γ B

1 1
 3.2 Stochastic Stability
= γp2 + 2 BB T . (14)
θ2 γ
We are now in a position to present the main stability
Since result.
γ 2 kdm k2 + θ2 kwm k2 = γp2 kvm k2 , Theorem 3. Consider system (1) subject to Assumptions 1
inequality (10) is equivalent to and 2. For any K making (A − BK) Schur, if the trigger
threshold λ satisfies condition (7), then the closed-loop
ε γp2 kvm k2 − kxm k2 ≥ V (xm+1 ) − V (xm )

(15) system is stable in the sense of Definition 1, that is,
= (Ap xm + Bp vm )T P (Ap xm + Bp vm ) − xTm P xm , sup E{kxm k2 } < +∞.
m∈N
It is straightforward to verify that condition (15) is guar-
anteed by the following matrix inequality: Proof. By Theorem 2, we can choose parameters θ, γ > 0
satisfying condition (8), and let P  0 and ε > 0 such
X − I − ATp XAp −ATp XBp
 
 0, (16) that inequalities (11), (10), and (16) hold. Combining
−BpT XAp γp2 I − BpT XBp inequalities (5), (11), and (10), we obtain that c1 kxm k2 ≤
where X = 1ε P  0. Furthermore, (16) can be ensured by V (xm ), and
the following strict inequality:

X − I − ATp XAp −ATp XBp
 V (xm+1 )
 0. (17)
−BpT XAp γp2 I − BpT XBp ≤ V (xm ) − ε 1 − λ2 θ2 kKk2 kxm k2 + εγ 2 kdm k2 ,

!
By Lemma 1, the feasibility of (17) is equivalent to that ε 1 − λ2 θ2 kKk2
≤ 1− · V (xm ) + εγ 2 kdm k2 .
c2
r
1 1
γp > kG̃k∞ = γp + 2 · kGk∞ ,
θ2 γ
Taking expectation, and using Assumption 2 as well as (3)
which is the scalar condition and (8), we obtain that E{kxm k2 } ≤ E{V (xm )}/c1 , and
1 1 1 E{V (xm+1 )} ≤ αE{V (xm )} + nc σ 2 εγ 2 , ∀m ≥ 0,
+ 2 < .
θ2 γ kGk2∞ 
where α , 1 − ε 1 − λ2 θ2 kKk2 /c2 < 1.
Next, by condition (7), we can choose any θ and γ such By (16) and (9), P  εI + ATp P Ap  εI, c2 ≥ c1 ≥ ε.
that   Therefore, α ≥ ελ2 θ2 kKk2 /c2 > 0. Defining a sequence
1 θkGk∞
θ ∈ kGk∞ , , γ>p . (18) {Em } as
λkKk θ2 − kGk2∞
Em+1 = α · Em + nc σ 2 εγ 2 , E0 = E{V (x0 )},
Thus, we have verified the existence of γ, θ > 0 satisfying and applying the comparison principle (Gil’ [2007]), we
condition (8), which guarantees the existence of the matrix obtain that
P such that inequalities (10) and (11) hold. The proof of 1 − αm
Theorem 2 is completed.  E{V (xm )} ≤ Em = αm E0 + · nc σ 2 εγ 2 .
1−α
Remark 1. (i) From (8), it follows that a small γ, which
intuitively means that the influence of channel noise on Consequently, for ∀ m ≥ 0,
system trajectories is weak, will lead to a large θ, which
in turn results in small value of λ and, consequently, more E{V (xm )}
E{kxm k2 } ≤
frequent updating. c1
(ii) To find desirable P , λ, θ, and ε satisfying the conditions c2 m c2 nc σ 2 γ 2
≤ α E{kx0 k2 } + , (20)
in Theorem 2, one may resort to solving the following c1 c1 (1 − λ2 θ2 kKk2 )
matrix inequality
  and supm≥0 E{kxm k2 } is upper-bounded by
P − εI − ATp P Ap −ATp P B −ATp P B
−B T P Ap εγ 2 I − B T P B −B T P B   0, c2 c2 n c σ 2 γ 2
E{kx0 k2 } + < +∞,

T
−B P Ap T
−B P B εθ I − B T P B
2 c1 c1 (1 − λ2 θ2 kKk2 )
(19) which completes the proof. 

10496
19th IFAC World Congress
Cape Town, South Africa. August 24-29, 2014

γp T   
Remark 2. (i) ISS stability (Sontag [2008]) has been es- γ B
γp γp
tablished in (20). If the ISS gain (sup E{kxm k2 }/(nc σ 2 )) γp2 I − γp T · P · B B
θ B γ θ
is considered as the event-triggered control performance, 1 T 1 T
I − γ 2 B P B γθ B P B
 
the important role of the extremal eigenvalues c1 and c2 = γp2 · 0. (24)
1
of matrix P has also been demonstrated. Although the − γθ B T P B I − θ12 B T P B
desirable parameters θ and γ can be found from condi-
tion (18), they are not sufficient to determine the control Then, applying the Schur complement, we obtain that
performance. 1
I − 2 BT P B
(ii) It is noted from (20) that the role of tuning rule (8) γ
or (18) is not only for theoretical analysis but also for  −1 (25)
1 T 1 T T
implementation. When designing the event-triggered con-  2 2B PB I − 2B PB B P B.
γ θ θ
trol, one cannot make the trigger threshold λ approach
the upper bound in (7), otherwise the upper bound of 
Note that B T P B = θ2 I − θ2 I − B T P B , then
E{kxm k2 } in (20) will increase to infinity and the closed-
loop stability may not be guaranteed.  −1
1 T 1 T
B PB I − 2B PB BT P B
θ2 θ
4. EQUIVALENT ARI/ARE     −1
1 1
= I − I − 2 BT P B I − 2 BT P B BT P B
In this section, the matrix P in the quadratic Liapunov θ θ
function will be obtained by means of ARI/ARE, which  −1
will be simplified to equivalent ARI/ARE in Theorem 6. 1 T
θ2 I − θ2 I − B T P B − B T P B

= I − 2B PB
These results can facilitate further analysis of control θ
performance. = θ θ I − BT P B
4 2
−1
− θ2 I − B T P B. (26)
From the analysis in Section 3, the matrix P and the
parameter ε can be scaled. Without loss of generality, Combining (25), (26), and that θ2 I − B T P B  0 resulting
we set ε = 1. Then, under the constraints that X = from (24), we obtain that
1 2 T
ε P = P  0 and γp I − Bp XBp  0, applying the Schur
−1
complement (Boyd and Vandenberghe [2004]), we obtain γ 2 I − B T P B  θ4 θ2 I − B T P B − θ2 I − B T P B;
that (16) as well as (19) can be guaranteed by the following
algebraic Riccati inequality (ARI) with definite constraint θ4
θ2 I − B T P B  I ⇒ β 2 I − B T P B  0. (27)
(Damm [2004]): γ 2 + θ2
R(P ) , P − I − ATp P Ap − Conversely, if β 2 I − B T P B  0, then as the implication
−1
ATp P Bp γp2 I − BpT P Bp BpT P Ap 0, (21) in (27) is in fact an equivalence relation, we obtain that
matrix inequality (25) holds. And similarly, I− θ12 B T P B 
γp2 I − BpT P Bp  0, 1 T 1 T −1 T
γ 2 θ 2 B P B(I − γ 2 B P B) B P B.
where R(·) is the Riccati operator (Damm [2004]).
Applying the Schur complement, we obtain the posi-
By Section 3.1 and Lemma 1, if condition (8) is satisfied, tive definiteness of γp2 I − BpT P Bp , which completes the
there exists P being the unique positive definite stabilizing proof. 
solution to the following ARE with definite constraint:
Let γp2 I − BpT P Bp  0, and denote Mp , Bp (γp2 I −
P − I − ATp P Ap =
−1 BpT P Bp )−1 BpT , M , B(β 2 I −B T P B)−1 B T . The following
ATp P Bp γp2 I − BpT P Bp BpT P Ap , (22) proposition will be obtained.
γp2 I − BpT P Bp  0. Proposition 5. The matrices Mp and M are equal.

Although ARI (21) and ARE (22) have provided P , they Proof. By the Matrix Inversion Formulas (Zhou et al.
involve the auxiliary parameter γp and the auxiliary ma- [1996]), (β 2 I − B T P B)−1 = β12 I + β12 B T P (β 2 I −
trix Bp . We will derive equivalent ARI/ARE independent BB T P )−1 B. Then,
of γp and Bp as follows. Denote
1 1 1 −1
β,q > kGk∞ , βλkKk < 1. (23) M= 2
BB T + 2 BB T P β 2 I − BB T P BB T
1 1
β β
θ2 + γ 2  −1
1 1 1 1
= 2 BB T + 2 BB T P −1 − 2 BB T BB T .
We have the following proposition. β β β β2
Proposition 4. The following equivalence of positive defi- Similarly,
niteness holds
1
γp2 I − BpT P Bp  0 ⇔ β 2 I − B T P B  0. Mp = Bp BpT +
γp2
 −1
1 T −1 1 T 1
B B
p p P − BB Bp BpT .
Proof. If γp2 I − BpT P Bp  0, γp2 γp2 γp2

10497
19th IFAC World Congress
Cape Town, South Africa. August 24-29, 2014

By (14), D. A. Bini, B. Iannazzo, and B. Meini. Numerical Solution


γp2 1 1 of Algebraic Riccati Equations. SIAM, 2012.
Bp BpT = BB T , Bp BpT = 2 BB T . S. Boyd and L. Vandenberghe. Convex Optimization.
β2 γp2 β Cambridge, 2004.
T. Damm. Rational Matrix Equations in Stochastic Con-
Therefore, Mp = M , which completes the proof. 
trol. Springer, 2004.
Combining Proposition 5 and Proposition 4, we obtain the A. Eqtami, D. V. Dimarogonas and K. J. Kyriakopoulos.
following result. Event-triggered control for discrete-time systems. In
Theorem 6. The following equivalences between ARIs and Proceedings of the 2010 American Control Conference,
between AREs hold: pp. 4719–4724, 2010.
M. I. Gil’. Difference Equations in Normed Spaces: Stabil-
• ARI (21) is equivalent to the following ARI ity and Oscillations. Elsevier, 2007.
R(P ) , P − I − ATp P Ap − S. Gupta. Increasing the sampling efficiency for a control
−1 system. IEEE Transactions on Automatic Control,
ATp P B β 2 I − B T P B B T P Ap  0 , (28) vol. 8, no. 3, pp. 263–264, 1963.
β2I − BT P B  0 ; W. P. M. H. Heemels and M. C. F. Donkers. Model-
based periodic event-triggered control for linear systems.
• ARE (22) is equivalent to the following ARE Automatica, vol. 49, pp. 698–711, 2013.
P − I − ATp P Ap = W. P. M. H. Heemels, M. C. F. Donkers, and A. R. Teel.
−1 Periodic event-triggered control for linear systems.
ATp P B β 2 I − B T P B B T P Ap , (29)
IEEE Transactions on Automatic Control, vol. 58, no. 4,
2 T
β I − B P B  0. pp. 847–861, 2013.
Remark 3. The obtained ARI/ARE conditions only in- V. Ionescu, C. Oară, and M. Weiss. Generalized Riccati
volve one single parameter, and there are many algorithms Theory and Robust Control: A Popov Function Ap-
in the literature that can solve ARE efficiently (Bini et al. proach. John Wiley & Sons, 1999.
[2012]). More importantly, the ARI/ARE conditions can E. Kofman. Quantized-state control: a method for discrete
be used to derive some analytic relationships among sta- event control of continuous systems. Latin American
bility/performance and channel noise as well as the event- Applied Research, vol. 33, no. 4, pp. 399–406, 2003.
trigger parameters. E. Kofman and J. H. Braslavsky. Level crossing sampling
in feedback stabilization under data-rate constraints. In
5. CONCLUSIONS Proceedings of the 45th IEEE Conference on Decision
and Control, pp. 4423–4428, 2006.
In this paper, the stochastic stability of discrete-time L. Li, X. Wang and M. Lemmon. Stabilizing bit-rate of
event-triggered control system over noisy channels has disturbed event triggered control systems. In Proceed-
been demonstrated. Based on the perturbed linear model ings of the 4th IFAC Conference on Analysis and Design
of periodic event-triggered control proposed in Heemels of Hybrid Systems, 2012.
and Donkers [2013], a simple scalar tuning rule for the M. Mazo, Jr. and P. Tabuada. Decentralized event-
event-trigger parameters is established to ensure closed- triggered control over wireless sensor/actuator net-
loop stability. Equivalences between ARIs/AREs are re- works. IEEE Transactions on Automatic Control,
vealed as well. These new results will be generalized by vol. 56, no. 10, pp. 2456–2461, 2011.
utilizing non-quadratic Liapunov functions (Bacciotti and G. N. Nair and R. J. Evans. Stabilizability of stochastic
Rosier [2005]), and applied to the analysis of H∞ and linear systems with finite feedback data rates. SIAM
H2 performances of the proposed event-trigger strategy Journal on Control and Optimization, vol. 43, no. 2,
in future study. Besides, the model-based event-triggered pp. 413–436, 2004.
control over noisy channels based on the constant control E. Sontag. Input to state stability: Basic concepts and
case will be studied in the near future. results. In P. Nistri and G. Stefani (Eds.), Nonlinear and
Optimal Control Theory, pp. 163–220. Springer Berlin
REFERENCES Heidelberg, 2008.
P. Tabuada. Event-triggered real-time scheduling of sta-
A. D. Ames, P. Tabuada, and S. Sastry. On the stability bilizing control tasks. IEEE Transactions on Automatic
of Zeno equilibria. In Hybrid Systems: Computation and Control, vol. 52, no. 9, pp. 1680–1685, 2007.
Control. Lecture Notes in Computer Science, vol. 3927, S. Tatikonda and S. Mitter. Control over noisy channels.
pp. 34–48. Springer Berlin Heidelberg, 2006. IEEE Transactions on Automatic Control, vol. 49, no. 7,
K. J. Åström and B. Bernhardsson. Comparison of peri- pp. 1196–1201, 2004.
odic and event based sampling for first order stochas- X. Wang and M. D. Lemmon. Event-triggering in dis-
tic systems. In Proceedings of the 14th IFAC World tributed networked control systems. IEEE Transactions
congress, pp. 301–306, 1999. on Automatic Control, vol. 56, no. 3, pp. 586–601, 2011.
K. J. Åström and B. M. Bernhardsson. Comparison of J. Xiong and J. Lam. Stabilization of linear systems over
Riemann and Lebesgue sampling for first order stochas- networks with bounded packet loss. Automatica, vol. 43,
tic systems. In Proceedings of the 41th IEEE Conference no. 1, pp. 80–87, 2007.
on Decision and Control, pp. 2011–2016, 2002. K. Zhou, J. C. Doyle, and K. Glover. Robust and Optimal
A. Bacciotti and L. Rosier. Liapunov Functions and Control. Printice-Hall, 1996.
Stability in Control Theory. 2nd Edition. Springer-
Verlag, 2005.

10498

You might also like