Event-triggered dissipative synchronization for Markovian jump neural networks with general transition probabilities

2018 ◽  
Vol 28 (13) ◽  
pp. 3893-3908 ◽  
Author(s):  
Yajuan Liu ◽  
Ju H. Park ◽  
Bao-Zhu Guo ◽  
Fang Fang ◽  
Funa Zhou
2021 ◽  
Vol 2021 ◽  
pp. 1-18
Author(s):  
Saravanan Shanmugam ◽  
M. Syed Ali ◽  
R. Vadivel ◽  
Gyu M. Lee

This study investigates the finite-time boundedness for Markovian jump neural networks (MJNNs) with time-varying delays. An MJNN consists of a limited number of jumping modes wherein it can jump starting with one mode then onto the next by following a Markovian process with known transition probabilities. By constructing new Lyapunov–Krasovskii functional (LKF) candidates, extended Wirtinger’s, and Wirtinger’s double inequality with multiple integral terms and using activation function conditions, several sufficient conditions for Markovian jumping neural networks are derived. Furthermore, delay-dependent adequate conditions on guaranteeing the closed-loop system which are stochastically finite-time bounded (SFTB) with the prescribed H ∞ performance level are proposed. Linear matrix inequalities are utilized to obtain analysis results. The purpose is to obtain less conservative conditions on finite-time H ∞ performance for Markovian jump neural networks with time-varying delay. Eventually, simulation examples are provided to illustrate the validity of the addressed method.


Complexity ◽  
2020 ◽  
Vol 2020 ◽  
pp. 1-19
Author(s):  
Jinxia Wang ◽  
Jinfeng Gao ◽  
Tian Tan ◽  
Jiaqi Wang ◽  
Miao Ma

This paper concentrates on the event-triggered H ∞ filter design for the discrete-time Markovian jump neural networks under random missing measurements and cyber attacks. Considering that the controlled system and the filtering can exchange information over a shared communication network which is vulnerable to the cyber attacks and has limited bandwidth, the event-triggered mechanism is proposed to relieve the communication burden of data transmission. A variable conforming to Bernoulli distribution is exploited to describe the stochastic phenomenon since the missing measurements occur with random probability. Furthermore, seeing that the communication networks are vulnerable to external malicious attacks, the transferred information via the shared communication network may be changed by the injected false information from the attackers. Based on the above consideration, sufficient conditions for the filtering error system to maintain asymptotically stable are provided with predefined H ∞ performance. In the end, three numerical examples are given to verify the proposed theoretical results.


Sign in / Sign up

Export Citation Format

Share Document