markovian jump neural networks
Recently Published Documents


TOTAL DOCUMENTS

74
(FIVE YEARS 27)

H-INDEX

21
(FIVE YEARS 5)

2021 ◽  
Vol 2021 ◽  
pp. 1-18
Author(s):  
Saravanan Shanmugam ◽  
M. Syed Ali ◽  
R. Vadivel ◽  
Gyu M. Lee

This study investigates the finite-time boundedness for Markovian jump neural networks (MJNNs) with time-varying delays. An MJNN consists of a limited number of jumping modes wherein it can jump starting with one mode then onto the next by following a Markovian process with known transition probabilities. By constructing new Lyapunov–Krasovskii functional (LKF) candidates, extended Wirtinger’s, and Wirtinger’s double inequality with multiple integral terms and using activation function conditions, several sufficient conditions for Markovian jumping neural networks are derived. Furthermore, delay-dependent adequate conditions on guaranteeing the closed-loop system which are stochastically finite-time bounded (SFTB) with the prescribed H ∞ performance level are proposed. Linear matrix inequalities are utilized to obtain analysis results. The purpose is to obtain less conservative conditions on finite-time H ∞ performance for Markovian jump neural networks with time-varying delay. Eventually, simulation examples are provided to illustrate the validity of the addressed method.


Author(s):  
Tamil Thendral M ◽  
Ganesh Babu T.R ◽  
Chandrasekar A ◽  
Yang Cao

In an modern world, image encryption played an vital role to prevent our data from illegal abuser entrée. Based on this, in this paper the Markovian jump neural networks for synchronization of sampled-data control systems with {two additive delay components are used on the looped functional method and its direct application is applied in image encryption.} Meanwhile, $x({t_{\chi}} )$ and $x({t_{\chi+1}})$ denotes the information states with tuning parameter and a few slack variable which is introduced in the derived result. Furthermore, the sampled-data controller is intended both the present and delayed state information, to enroll the control performance and flexibility. Finally by using the new technique, the several examples are highlighted in the numerical section and also the effectiveness of an image encryption is studied.


2021 ◽  
Vol 432 ◽  
pp. 240-249
Author(s):  
Yao Wang ◽  
Shengyuan Xu ◽  
Yongmin Li ◽  
Yuming Chu ◽  
Zhengqiang Zhang

Sign in / Sign up

Export Citation Format

Share Document