This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Coded Event-triggered Control for Nonlinear Systems

Ruihang Ji jiruihang@nus.edu.sg    Shuzhi Sam Ge samge@nus.edu.sg    Kai Zhao zhaokai@cqu.edu.cn Electrical and Computer Engineering, National University of Singapore, Singapore 117583, Singapore School of Automation, Chongqing University, Chongqing 400044, China
Abstract

This paper studies a Coded Event-triggered Control (CEC) for a class of nonlinear systems under any initial condition. To reduce communication burden, the CEC is designed from the encoding-decoding viewpoint by which only mm-length string is transmitted for each communication between CEC and actuator. If a more general Entry Capture Problem is encountered, such control design will be rather complicated yet challenging where the performance constraints are satisfied some time after (rather than from the beginning of) system operation, rendering normally employed prescribed performance control invalid because they may be not defined in the initial interval. By introducing auxiliary functions, we develop a Self-adjustable Prescribed Performance (SPP) mechanism which can flexibly adjust the symmetric or asymmetric performance boundaries to accommodate different initial conditions, providing an effective solution for the underlying tracking problem. In this way, the resulted CEC can not only consume less communication resources but also regulate the tracking error under any initial condition into an allowable set before a given time in a bounded and customizable manner. Simulation results verify and clarify the theoretical findings.

keywords:
Coded event-triggered control; Self-adjustable prescribed performance; Nonlinear systems; Auxiliary functions.
thanks: This research was supported by the National Research Foundation Singapore under its AI Singapore Programme, Award Number: AISG2-GC-2023-007; Chongqing Top-Notch Young Talents Project under Grant cstc2024ycjh-bgzxm0085; Singapore Maritime Institute (SMI) under its Maritime Transformation Program (MTP) White Space Fund, Project ID: SMI-2022-MTP-08; and also supported by Enabling Future Systems for Offshore Wind Resources (ENFORCE) programme supported by A*STAR under its RIE 2025 Industry Alignment Fund, Grant No: M23M4a0067. thanks: Corresponding author: Shuzhi Sam Ge.

, ,

1 Introduction

Practical systems often operate under limited computational loads but need to maintain certain performance constraints, arising from hardware capability and task requirements, for example, the target tracking problem of aerial robots or the manipulator grasping. Nowadays, event-based control has enticed sustained interest due to its resource efficiency (Wang & Krstic (2022); Åarzén (1999); Åström & Bernhardsson (1999); Heemels et al. (2012); Deng et al. (2022); Sun et al. (2022); Liu et al. (2023)). As systems grow in complexity, how to save communication resources and guarantee system performance at the same time deserve more in-depth studies.

The event-based control is pioneered in Åarzén (1999); Åström & Bernhardsson (1999), which emphasizes its advantages over periodic sampling and motivates its systematic design later (Tabuada (2007)). Since then, it has aroused widespread research interest, see, Dimarogonas et al. (2011); Fan et al. (2013); Girard (2014); Xing et al. (2016); Kumari et al. (2020); Zhang, Wen, Zhao & Song (2022) and references therein. However, most existing protocols primarily focus on reducing unnecessary signal transmission but neglect the encoding-decoding process and the associated security concerns for each communication between the control box and the actuator. In practice, when the event condition is met, the real control input is encoded into a lengthy codeword (i.e., 16 bits) before transmission. This could aggravate communication delays and congestion issues due to the limited bandwidth, particularly when communication bits are critical. Moreover, exposing sensitive system signals to public channels raises security concerns. This motivates us to further study event-triggered control from an encoding-decoding viewpoint, and the following two aspects need to be considered:

  1. (i)

    Resource saving. It might be redundant to transmit such a large number of digits for each communication between control box and actuator, especially when the magnitude of control signal is small. Moreover, in situations where the communication channel can only handle a limited number of bits at a time, lengthy strings for communication can lead to transmission delays and increase vulnerability to packet losses (Mazo Jr & Cao (2014); Ding et al. (2017)). Therefore, it is critical to further save communication resources from the encoding-decoding scheme viewpoint.

  2. (ii)

    Performance maintenance. Considering the error induced by the event-trigger scheme, it may degrade the tracking performance. By the prescribed performance control (Bechlioulis & Rovithakis (2008); Zhao et al. (2017); Ji, Li, Ma & Ge (2022); Bu et al. (2023), to name a few), the studies of event-triggered control with prescribed performance have been investigated in (Liu et al. (2020); Zhang & Yang (2020); Zhang, Che, Deng & Wu (2022)). These results are based on an implicit assumption that the prescribed performance should be satisfied from the beginning of system operation. However, in practice, the system’s initial conditions often violate the initial performance constraints, rendering these existing methods inapplicable since they are not defined outside the allowable set and the singularity problem is encountered. Therefore, how to develop an event-triggered control with prescribed performance applicable for any initial conditions is still an open problem.

To handle the first problem, one excellent work in Xing et al. (2018) proposes a 1-bit communication protocol for the relative threshold. Note that this protocol is unable to promptly respond to signal changes due to the high threshold when control inputs are extremely large. As stated in Xing et al. (2018), the original control signals need to be transmitted sometimes to re-calibrate the decoder due to the signal distortion problem. The other work in Zhang et al. (2020) studies a 2-bit strategy, switching between fixed and relative thresholds based on the magnitude of control inputs. Therefore, the transmissions of control inputs between control and actuator are necessary, which aggravates the communication burden, especially when the bandwidth is limited. Moreover, all these communication protocols are only applicable to binary systems, limiting their implementation in practice. How to design an effective coded event-triggered scheme for more general base-pp number systems to address the above problems is interesting yet challenging.

For the second problem, the funnel boundary (Ilchmann et al. (2002); Berger et al. (2022)), the global performance functions (Zhao et al. (2021); Chen & Hua (2020)), and tuning functions Zhang et al. (2021); Ji et al. (2023) can remove such initial limitations. However, several limitations are observed: (i) The global tracking abilities of funnel boundary and the global prescribed functions are achieved by sacrificing overshoot performance. As their initial performance tends to infinity, it leads to loose performance constraints. (ii) These two methods are only suitable for symmetric performance distribution and rely on specific performance functions, which limits their extensions to more general cases. (iii) Although tuning functions are studied to address a more practical yet challenging Entry Capture Problem, there are no performance constraints on tracking errors during the initial interval. This could lead to potential operational and safety issues. Therefore, how can we regulate any initial tracking error into the allowable set in a bounded and customized manner makes our control design more complicated.

In this paper, we propose a CEC and a SPP to reduce the communication resources between control and actuator while addressing the Entry Capture Problem for a class of nonlinear systems. The main contributions lie in:

  1. (i)

    We design a CEC, by which only mm-length string of base-pp number system is transmitted for each communication between control box and actuator. Compared with the existing event-triggered results, the CEC can further reduce the communication burden specifically from the encoding-decoding viewpoint.

  2. (ii)

    Different from Zhao et al. (2021); Zhang et al. (2021); Berger et al. (2022), the proposed SPP can flexibly adjust its performance boundaries in accordance with different initial conditions by introducing auxiliary functions. This feature offers an effective solution to make the control design applicable to any initial conditions, which can be easily extended to other methods.

  3. (iii)

    With the aid of SPP, for any initial condition (including initial-constraint violation), the resulted CEC can handle the Entry Capture Problem for either symmetric or asymmetric performance constraints, by which the tracking error is regulated into an allowable set before a given time in a bounded yet customizable manner rather than no constraints there. In this way, the initial-condition constraints are removed and better transient performance is achieved.

2 Problem Formulation and Preliminaries

2.1 Problem statement

Consider a class of strict-feedback nonlinear systems

{x˙i=fi(x¯i)+gi(x¯i)xi+1,i=1,,n1x˙n=fn(x¯n)+gn(x¯n)uy=x1\displaystyle\left\{\begin{array}[]{ll}\dot{x}_{i}=f_{i}(\bar{x}_{i})+g_{i}(\bar{x}_{i})x_{i+1},&i=1,\dots,n-1\\ \dot{x}_{n}=f_{n}(\bar{x}_{n})+g_{n}(\bar{x}_{n})u\\ y=x_{1}\end{array}\right. (4)

where xix_{i}\in\mathbb{R}, i=1,,ni=1,\dots,n, is the system state with x¯i=[x1,,xi]Ti\bar{x}_{i}=[x_{1},\dots,x_{i}]^{T}\in\mathbb{R}^{i}, fi():if_{i}(\cdot):\mathbb{R}^{i}\rightarrow\mathbb{R} is an unknown but continuous function, gi():ig_{i}(\cdot):\mathbb{R}^{i}\rightarrow\mathbb{R} denotes an unknown time-varying control coefficient, uu\in\mathbb{R} and yy\in\mathbb{R} are system input and output, respectively.

Define the tracking error e1(t)=y(t)yd(t)e_{1}(t)=y(t)-y_{d}(t) with yd(t)y_{d}(t) being the desired trajectory. The control objective is to design a CEC for the nonlinear systems (4) under any initial condition such that:

  1. (i)

    All signals in the closed-loop systems are bounded;

  2. (ii)

    Only a coded mm-length string is required for each communication between CEC and actuator when the event-trigger condition is satisfied; and

  3. (iii)

    For any initial condition, the tracking error e1(t)e_{1}(t) can be regulated into the prescribed allowable set in a customizable manner before a given time and then be constrained within there.

Definition 1.

For any initial tracking condition (including initial constraint violation), if the tracking error e1(t)e_{1}(t) is fully constrained by the prescribed performance boundaries right after a user-given settling time T>0T>0:

el(t)<e1(t)<eu(t),tT,\displaystyle-e_{l}(t)<e_{1}(t)<e_{u}(t),~{}\forall t\geq T, (5)

then, such error tracking performance is said to be Entry Capture Problem, where el(t)-e_{l}(t) and eu(t)e_{u}(t) denote lower and upper prescribed boundaries, respectively.

Remark 1.

The studied Entry Capture Problem represents a frequently encountered tracking situation that the prescribed performance is involved right after a given time TT, whereas, in most existing works, these performance constraints should be satisfied from the beginning of system operation. One typical example is a flight system which is often released from any condition (including initial-constraint violation), but is required to track and interact with a target in prescribed performance for successful task completion. Therefore, addressing such Entry Capture Problem is interesting yet more challenging since it needs the control design applicable for more general cases.

Assumption 1.

The desired trajectory yd(t)y_{d}(t) and its time derivatives up to (n+1)(n+1)th-order are known, bounded, and piece-wise continuous.

Assumption 2.

The nonlinear function fi(x¯i)f_{i}(\bar{x}_{i}), i=1,,ni=1,\dots,n, is unknown but certain crude information is available so that |fi(x¯i)|biϕi(x¯i)|f_{i}(\bar{x}_{i})|\leq b_{i}\phi_{i}(\bar{x}_{i}), t0\forall t\geq 0, where bi0b_{i}\geq 0 is an unknown constant and ϕi(x¯i)0\phi_{i}(\bar{x}_{i})\geq 0 is a known smooth function.

Assumption 3.

The control coefficient gi(x¯i)g_{i}(\bar{x}_{i}), i=1,,ni=1,\dots,n ,is unknown and time-varying, but away from zero, that is, there exist positive constants g¯i\underline{g}_{i} and g¯i\bar{g}_{i} such that 0<g¯i|gi(x¯i)|g¯i0<\underline{g}_{i}\leq|g_{i}(\bar{x}_{i})|\leq\bar{g}_{i}. Without loss of generality, we assume that the signs of gi(x¯i)g_{i}(\bar{x}_{i}) are known and all positive.

Remark 2.

Assumption 1 is widely adopted in tracking control of nonlinear systems (Krstic et al. (1995)). Assumption 2 indicates that some core functions can be easily extracted only based on some crude system information, which is reasonable and in line with practice (Polycarpou & Ioannou (1993). Assumption 3 is necessary to guarantee the controllable condition of nonlinear system (4), which is made in most control design (Jin (2018)).

3 Main Results

3.1 Coded Event-triggered Scheme

With respect to the second objective of CEC, we introduce a Coded Event-triggered Scheme (CES) as follows:

u(t)=v(tk),t[tk,tk+1),k=0,1,\displaystyle u(t)=v(t_{k}),~{}\forall t\in[t_{k},t_{k+1}),~{}k=0,1,\dots (6)
tk+1=inf{t>tk||Δv(t)|ωpβ},\displaystyle t_{k+1}=\inf\{t>t_{k}~{}|~{}|\Delta v(t)|\geq\omega p^{\beta}\}, (7)

where v(t)v(t) is the actual control to be developed, Δv(t)=v(t)u(t)\Delta v(t)=v(t)-u(t) denotes the control signal error, tkt_{k} represents the update time, pp is an even number leading to base-pp system (i.e., Binary, Octal number system), the selections of β\beta and ω\omega adopt the following rules:

b=q,if|u(t)|[πq,πq+1),\displaystyle b=q,~{}~{}\text{if}~{}~{}|u(t)|\in[\pi_{q},\pi_{q+1}), (8)
β=b={j=1msj,kpj1ifsm,k<p2,j=1msj,kpj1scifsm,kp2,\displaystyle\beta=b=\left\{\begin{array}[]{ll}\sum_{j=1}^{m}s_{j,k}p^{j-1}&\text{if}~{}s_{m,k}<\frac{p}{2},\\ \sum_{j=1}^{m}s_{j,k}p^{j-1}-s_{c}&\text{if}~{}s_{m,k}\geq\frac{p}{2},\end{array}\right. (11)
ω=ωb,\displaystyle\omega=\omega_{b}, (12)

where q{0,1,,sc1}q\in\{0,1,\dots,s_{c}-1\}, sc=pm2s_{c}=\frac{p^{m}}{2} with mm being the length of encoded string to be transmitted, as such as there are scs_{c} variations, we specify 0=π0<π1<<πsc1<πsc=+0=\pi_{0}<\pi_{1}<\dots<\pi_{s_{c}-1}<\pi_{s_{c}}=+\infty to measure the level of control input, ω0,,ωsc1\omega_{0},\dots,\omega_{s_{c}-1} are positive constants chosen by designers, and sj,k{0,1,,p1}s_{j,k}\in\{0,1,\dots,p-1\} denotes each digit value of base-pp number system at kk-th updated time. From the triggering condition in (7), it becomes essential to determine the sign of Δv(t)\Delta v(t) for accurate encoding-decoding procedures. As shown in the encoding procedure (11) and the later decoding procedure (16), it indicates that if Δv(t)>0\Delta v(t)>0, let sm,k<p2s_{m,k}<\frac{p}{2}, otherwise, sm,kp2s_{m,k}\geq\frac{p}{2}. Therefore, supposing t[tk,tk+1)t\in[t_{k},t_{k+1}), k=0,1,k=0,1,\dots, the encoded string SkS_{k}, used for the communication between control and actuator, is constructed by

Sk=sm,ksm1,ks2,ks1,k,\displaystyle S_{k}=s_{m,k}s_{m-1,k}\dots s_{2,k}s_{1,k}, (13)

where SkS_{k} is a mm-length string to be transmitted whenever the criteria in (7) is satisfied. Based on (7) and (11), SkS_{k} can be seen as a sign-and-magnitude representation of the threshold for the control signal error Δv(t)\Delta v(t). More specifically, sm,ks_{m,k} denotes a sign digit, whose value determines the sign of Δv(t)\Delta v(t) (i.e., ifsm,k<p2,Δv(t)0\text{if}~{}s_{m,k}<\frac{p}{2},~{}\Delta v(t)\geq 0 and ifsm,kp2,Δv(t)<0\text{if}~{}s_{m,k}\geq\frac{p}{2},~{}\Delta v(t)<0); and the magnitude of the threshold for Δv(t)\Delta v(t) is derived by the remaining digital numbers, i.e., sm1,k,,s1,ks_{m-1,k},\dots,s_{1,k}.

If CES in (7) is satisfied at tkt_{k}, SkS_{k} is expected to be broadcasted to the actuator. When the actuator receives SkS_{k}, it adopts the following decoder process to update ud(t)u_{d}(t) with the aid of the last control input and parameters stored:

ud(t)=v(tk)={v(tk1)+ωpβifsm,k<p2v(tk1)ωpβifsm,kp2\displaystyle u_{d}(t)=v(t_{k})=\left\{\begin{array}[]{ll}v(t_{k-1})+\omega p^{\beta}&\text{if}~{}s_{m,k}<\frac{p}{2}\\ v(t_{k-1})-\omega p^{\beta}&\text{if}~{}s_{m,k}\geq\frac{p}{2}\\ \end{array}\right. (16)

where ud(0)=v(t0)u_{d}(0)=v(t_{0}), and the selections of β\beta and ω\omega follow the same rules in (8)-(12), which are also stored in the actuator. Based on the triggering condition in (7) and the decoder rule in (16), it can be derived that u(t)=ud(t)u(t)=u_{d}(t). Throughout this paper, we only use u(t)u(t) to simplify the control design. In summary, the CES is illustratively described in Fig. 1.

Refer to caption
Figure 1: Coded Event-triggered Scheme.

To clearly illustrate the CES, we give a simple case with p=2p=2 and m=3m=3. This results in a Binary number system and 33-bit binary string is used for each communication between CEC and actuator, where each digit value of Binary number system has a value of either 1 or 0. The encoding and decoding processes in (13) and (16) are executed as shown in Table 1 whenever the condition in (7) is triggered.

Table 1: Encoder and decoder design under p=2p=2 and m=3m=3
Encoder Decoder
Sk=000S_{k}=000 u(t)=v(tk)+ωpβu(t)=v(t_{k})+\omega p^{\beta},  β=0\beta=0,   ω=ω0\omega=\omega_{0},  p=2p=2
Sk=001S_{k}=001 u(t)=v(tk)+ωpβu(t)=v(t_{k})+\omega p^{\beta},  β=1\beta=1,   ω=ω1\omega=\omega_{1},  p=2p=2
Sk=010S_{k}=010 u(t)=v(tk)+ωpβu(t)=v(t_{k})+\omega p^{\beta},  β=2\beta=2,   ω=ω2\omega=\omega_{2},  p=2p=2
Sk=011S_{k}=011 u(t)=v(tk)+ωpβu(t)=v(t_{k})+\omega p^{\beta},  β=3\beta=3,   ω=ω3\omega=\omega_{3},  p=2p=2
Sk=100S_{k}=100 u(t)=v(tk)ωpβu(t)=v(t_{k})-\omega p^{\beta},  β=0\beta=0,   ω=ω0\omega=\omega_{0},  p=2p=2
Sk=101S_{k}=101 u(t)=v(tk)ωpβu(t)=v(t_{k})-\omega p^{\beta},  β=1\beta=1,   ω=ω1\omega=\omega_{1},  p=2p=2
Sk=110S_{k}=110 u(t)=v(tk)ωpβu(t)=v(t_{k})-\omega p^{\beta},  β=2\beta=2,   ω=ω2\omega=\omega_{2},  p=2p=2
Sk=111S_{k}=111 u(t)=v(tk)ωpβu(t)=v(t_{k})-\omega p^{\beta},  β=3\beta=3,   ω=ω3\omega=\omega_{3},  p=2p=2

Some salient features of such CES can be observed from the following aspects.

  1. (i)

    Considering the relative threshold in Xing et al. (2018) with tk+1=inf{t>tk||Δv(t)|δ¯|u(t)|+d,0<δ¯<1,d>0}t_{k+1}=\inf\{t>t_{k}~{}|~{}|\Delta v(t)|\geq\bar{\delta}|u(t)|+d,0<\bar{\delta}<1,d>0\}, it is unable to promptly respond to signal changes due to the high threshold when |u(t)||u(t)| is extremely large. This signal distortion often degrades tracking performance. A switching threshold scheme is proposed in Xing et al. (2016) which switches between fixed and relative thresholds based on the magnitude of control input. However, it indicates that the transmission of raw control input between control and actuator is necessary, which aggravates the communication burden, especially when the bandwidth is limited. Therefore, our CES is designed from an encoding-decoding viewpoint by which only a concise m-length string is transmitted for each communication instead of the raw control input and mm can be chosen by designers. It not only reduces the bandwidth required but also provides a balanced strategy between system performance and network constraints. Please find the following critical point for more details.

  2. (ii)

    Different from the fixed threshold in Xing et al. (2016); Kumari et al. (2020); Zhang, Wen, Zhao & Song (2022) and the above relative threshold where thresholds are either constants or increase monotonically with |u(t)||u(t)|, the proposed CES adopts a piecewise increasing threshold related to |u(t)||u(t)| and tends to a constant threshold when |u(t)||u(t)| is excessively large. This dynamic threshold facilitates more accurate tracking performance due to the lower threshold when |u(t)||u(t)| is small, and ensures a rapid response to the signal’s change when |u(t)||u(t)| is large with the aid of the constant threshold. Therefore, the signal distortion problem commonly observed in fixed and relative thresholds is effectively alleviated since our CES has a good balance between system performance and resource constraints. Comparative simulations are conducted in Section 6 to illustrate the effectiveness of our CES. Moreover, the fixed threshold can be seen as a special case of our CES if we set p=2p=2 and m=1m=1 in (7).

  3. (iii)

    The excellent work in Xing et al. (2018) also studies a 1-bit communication protocol for the relative threshold scheme. However, the original control input needs to be transmitted sometimes to re-calibrate the decoder due to the severe signal distortion as the aforementioned discussed. In this paper, our CES not only alleviates the signal distortion problem but also addresses the challenge of co-designing an event-trigger scheme with encoding-decoding rules. As a result, the CES provides a leaner communication protocol, which is friendly for practical systems with limited communication bit resources. On the other hand, by encrypting the control signal into an encoded string SkS_{k}, we inherently improve communication security against potential cyber threats without the knowledge of encoding-decoding rules.

3.2 Auxiliary Functions

To deal with the third control objective of this article, we first introduce the definition of auxiliary functions.

Definition 2.

Auxiliary functions ηu(t)\eta_{u}(t) and ηl(t)\eta_{l}(t) are scalar functions which satisfies the following properties:

  1. (i)

    ηu(k)\eta_{u}^{(k)} and ηl(k)\eta_{l}^{(k)}, k=0,,n+1k=0,\dots,n+1, are known, continuous, and bounded;

  2. (ii)

    ηu(0)>e1(0)eu(0)\eta_{u}(0)>e_{1}(0)-e_{u}(0) and ηl(0)<e1(0)+el(0)\eta_{l}(0)<e_{1}(0)+e_{l}(0);

  3. (iii)

    ηu(t)\eta_{u}(t), ηl(t)\eta_{l}(t), η˙u(t)\dot{\eta}_{u}(t), η˙l(t)0\dot{\eta}_{l}(t)\rightarrow 0 as tTt\rightarrow T, where TT is the settling time in (5); and

  4. (iv)

    ηu(t)ηl(t)\eta_{u}(t)\geq\eta_{l}(t), t0\forall t\geq 0 and ηu(t)=ηl(t)=0\eta_{u}(t)=\eta_{l}(t)=0, tT\forall t\geq T.

Obviously, there exist many candidates satisfying these properties, for example,

ηu(t)={(e1(0)+(λ2)eu(0)+λel(0)2)elTtTt,0t<T0,tT\displaystyle\eta_{u}(t)=\left\{\begin{array}[]{ll}(e_{1}(0)+\frac{(\lambda-2)e_{u}(0)+\lambda e_{l}(0)}{2})e^{-\frac{lTt}{T-t}},&0\leq t<T\\ 0,&t\geq T\end{array}\right. (19)
ηl(t)={(e1(0)λeu(0)+(λ2)el(0)2)elTtTt,0t<T0,tT\displaystyle\eta_{l}(t)=\left\{\begin{array}[]{ll}(e_{1}(0)-\frac{\lambda e_{u}(0)+(\lambda-2)e_{l}(0)}{2})e^{-\frac{lTt}{T-t}},&0\leq t<T\\ 0,&t\geq T\end{array}\right. (22)

where ll and λ1\lambda\geq 1 are positive constants, el(0)e_{l}(0) and eu(0)e_{u}(0) denote the initial values of performance constraints el(t)e_{l}(t) and eu(t)e_{u}(t) which will be defined in the next section. Throughout this paper, we use the above functions as the auxiliary functions.

Remark 3.

More details about the motivation of such auxiliary functions are provided here. From the third objective in section 2.1, the control scheme should be adapted to any initial condition. However, in practice, the initial condition may violate the performance constraints initially, rendering most existing PPC methods inapplicable since they are not defined and suffer from singularity problem in such scenario. To handle this problem, a straightforward approach is to utilize these auxiliary functions to adjust the performance boundaries in accordance with the initial condition. By leveraging the second property in Definition 2, any given initial condition would remain within an updated and allowable set, thereby ensuring the applicability of the control method. Other properties are also crucial for system analysis under addressing the Entry Capture Problem (5). Moreover, there would be fruitful expressions of such additional auxiliary functions which facilitate their extension to other control approaches.

3.3 Self-adjustable Prescribed Performance

We design the following Self-adjustable Prescribed Performance (SPP) on the tracking error e1(t)e_{1}(t) by introducing the above auxiliary functions into the performance boundaries:

El(t)<e1(t)<Eu(t),t0,\displaystyle-E_{l}(t)<e_{1}(t)<E_{u}(t),~{}\forall t\geq 0, (23)

with

Eu(t)=eu(t)+ηu(t),\displaystyle E_{u}(t)=e_{u}(t)+\eta_{u}(t), (24)
El(t)=el(t)ηl(t),\displaystyle E_{l}(t)=e_{l}(t)-\eta_{l}(t), (25)

where eu(t)e_{u}(t) and el(t)-e_{l}(t) represent the original upper and lower Tunnel Prescribed Performance (TPP) (Ji, Li & Ge (2022)), which are given by:

eu(t)=(δ+sign(e1,0))ρ(t)ρsign(e1,0),\displaystyle e_{u}(t)=(\delta+\text{sign}(e_{1,0}))\rho(t)-\rho_{\infty}\text{sign}(e_{1,0}), (26)
el(t)=(δsign(e1,0))ρ(t)+ρsign(e1,0),\displaystyle e_{l}(t)=(\delta-\text{sign}(e_{1,0}))\rho(t)+\rho_{\infty}\text{sign}(e_{1,0}), (27)

where 0<δ<10<\delta<1, e1,0=e1(0)e_{1,0}=e_{1}(0), ρ(t)=(ρ0ρ)eςt+ρ\rho(t)=(\rho_{0}-\rho_{\infty})e^{-\varsigma t}+\rho_{\infty} with ρ0>ρ>0\rho_{0}>\rho_{\infty}>0 and ς>0\varsigma>0.

To better illustrate the mechanism behind such SPP, we take e1(0)>0e_{1}(0)>0 as an example. The parameters of SPP (24)-(25) are selected as: δ=0.6\delta=0.6, ρ0=0.5\rho_{0}=0.5, ρ=0.2\rho_{\infty}=0.2, l=1l=1, ς=1.2\varsigma=1.2, λ=3\lambda=3, T=4T=4, and the initial tracking condition is e1(0)=2e_{1}(0)=2. As shown in the left plot of Fig. 2, the initial tracking error e1(0)e_{1}(0) violates the original allowable set established by eu(t)e_{u}(t) and el(t)-e_{l}(t), which is colored in brown. It renders the previous methods inapplicable due to the singularity problem encountered. With the aid of the auxiliary functions, SPP is capable of re-adjusting the performance boundaries according to different initial conditions such that e1(t)e_{1}(t) is always within the updated allowable set initially (i.e., El(0)<e1(0)<Eu(0)-E_{l}(0)<e_{1}(0)<E_{u}(0)) as shown in the right plot of Fig. 2 in green color. During the initial time interval (0tT0\leq t\leq T), our SPP not only ensures the control method applicable for any initial conditions but also provides temporary performance constraints on the tracking error. When tTt\geq T, SPP is equivalent to the original performance boundaries, that is, Eu(t)=eu(t)E_{u}(t)=e_{u}(t) and El(t)=el(t)-E_{l}(t)=-e_{l}(t) since ηu(t)=ηl(t)=0\eta_{u}(t)=\eta_{l}(t)=0 as depicted in the right figure. Therefore, SPP provides an effective solution for the underlying Entry Capture Problem (5) as stated in the following lemma.

Refer to caption
Figure 2: The mechanism behind the Self-adjustable Prescribed Performance.
Lemma 1.

If El(t)<e1(t)<Eu(t)-E_{l}(t)<e_{1}(t)<E_{u}(t) holds for all t0t\geq 0, then the Entry Capture Problem (5) is obtained.

Proof.

When 0t<T0\leq t<T, the boundedness of ηu(t)\eta_{u}(t) and ηl(t)\eta_{l}(t) is guaranteed according to Definition 2. By (26)-(27), the original TPP is also bounded there. It ensures that e1(t)e_{1}(t) is bounded on [0,T)[0,T). When tTt\geq T, we have El(t)<e1(t)<Eu(t)-E_{l}(t)<e_{1}(t)<E_{u}(t) which can be rewritten as el(t)<e1(t)<eu(t)-e_{l}(t)<e_{1}(t)<e_{u}(t). If the above statement holds, the Entry Capture Problem is, therefore, addressed by invoking Definition 1. ∎

From the above discussion, the control objective is successfully transfered to guarantee e1(t)e_{1}(t) evolving within the SPP envelope (23) to deal with the issue of Entry Capture Problem.

Remark 4.

In comparison with funnel boundary (Berger et al. (2022)), global prescribed performance (Zhao et al. (2021); Zhang et al. (2021)) and tuning functions (Zhang et al. (2021); Ji et al. (2023)), some salient features of the proposed SPP (23) are observed as follows:

  1. (i)

    (Improved transient performance) The funnel boundary and global prescribed performance often encounter an overshoot problem, as their initial performance constraints tend to infinity leading to a loose allowable set. Similarly, by tuning functions, there are no constraints on tracking errors during the initial interval, which is undesirable in practice due to safety concerns and task demands. Different from these methods, our SPP is capable of adjusting performance boundaries with the help of auxiliary functions such that the proposed control scheme can be applied to any initial condition even if the initial constraints are violated. It provides bounded yet customizable virtual performance boundaries during the initial interval as depicted in Fig. 2, effectively avoiding the aforementioned severe overshoot performance and unconstrained behaviors. The tracking error is regulated into the allowable set within finite time and Entry Capture Problem is therefore solved.

  2. (ii)

    (Flexibility and Extendibility) Our SPP allows for an easy extension to other control methods by integrating the introduced auxiliary functions into the performance boundaries as formulated in (23)-(25). However, the funnel boundary and global prescribed performance rely on specific performance functions, which limits their adaptability to other control methods. Moreover, the previous methods are limited to symmetric performance distributions but the proposed SPP is applicable to both symmetric and asymmetric cases, thereby enhancing its applicability to more general cases. In this paper, we employ asymmetric TPP as the baseline, which not only provides a tighter allowable set but also limits overshoot performance during the initial interval of the Entry Capture Problem.

4 Coded Event-triggered Control for Second-order System

To clearly illustrate our design methodology, we first consider the following second-order nonlinear system:

{x˙1=f1(x¯1)+g1(x¯1)x2,x˙2=f2(x¯2)+g2(x¯2)u,\displaystyle\left\{\begin{array}[]{ll}\dot{x}_{1}=f_{1}(\bar{x}_{1})+g_{1}(\bar{x}_{1})x_{2},\\ \dot{x}_{2}=f_{2}(\bar{x}_{2})+g_{2}(\bar{x}_{2})u,\end{array}\right. (30)

where x1x_{1} and x2x_{2} are system states, fi(x¯i)f_{i}(\bar{x}_{i}) and gi(x¯i)g_{i}(\bar{x}_{i}), i=1,2i=1,2, are unknown yet smooth nonlinear functions satisfying Assumptions 2-3, and uu denotes the system control input.

Step 1: We first define the tracking errors:

e1=x1yd\displaystyle e_{1}=x_{1}-y_{d} (31)
e2=x2α1,\displaystyle e_{2}=x_{2}-\alpha_{1}, (32)

where α1\alpha_{1} represents the virtual control input to be defined shortly. In order to guarantee e1e_{1} satisfying SPP (23) for all t0t\geq 0, we introduce the following error transformation function

z1=ln(El+e1Eue1)\displaystyle z_{1}=\ln\left(\frac{E_{l}+e_{1}}{E_{u}-e_{1}}\right) (33)

then, by invoking (24)-(25) and (32), its time derivative is

z˙1\displaystyle\dot{z}_{1} =μ1e˙1+μ2=μ1(f1+g1e2y˙d+g1α1)+μ2\displaystyle=\mu_{1}\dot{e}_{1}+\mu_{2}=\mu_{1}(f_{1}+g_{1}e_{2}-\dot{y}_{d}+g_{1}\alpha_{1})+\mu_{2} (34)

where μ1=(Eu+El)\mu_{1}=\ell(E_{u}+E_{l}) and μ2=((e˙lη˙l)(Eue1)(e˙u+η˙u)(El+e1))\mu_{2}=\ell((\dot{e}_{l}-\dot{\eta}_{l})(E_{u}-e_{1})-(\dot{e}_{u}+\dot{\eta}_{u})(E_{l}+e_{1})) and =1(e1+El)(Eue1)\ell=\frac{1}{(e_{1}+E_{l})(E_{u}-e_{1})}. From (24)-(27) and the property (iv) in Definition 2, it can be derived that Eu(t)+El(t)>0E_{u}(t)+E_{l}(t)>0 and (Eu(t)e1(t))(El(t)+el(t))>0(E_{u}(t)-e_{1}(t))(E_{l}(t)+e_{l}(t))>0 are bounded functions for e1(t)e_{1}(t) in the compact set Ωe1={e1(t):El(t)<e1(t)<Eu(t)}\Omega_{e_{1}}=\{e_{1}(t)\in\mathbb{R}:-E_{l}(t)<e_{1}(t)<E_{u}(t)\}. Therefore, we have μ10\mu_{1}\neq 0 and μ1L\mu_{1}\in L_{\infty}. Then, the time derivative of 12z12\frac{1}{2}z_{1}^{2} along (34) is:

z1z˙1\displaystyle z_{1}\dot{z}_{1} =z1μ1(f1+g1e2y˙d)+z1μ1g1α1+z1u2\displaystyle=z_{1}\mu_{1}(f_{1}+g_{1}e_{2}-\dot{y}_{d})+z_{1}\mu_{1}g_{1}\alpha_{1}+z_{1}u_{2}
=z1μ1g1α1+Ξ1,\displaystyle=z_{1}\mu_{1}g_{1}\alpha_{1}+\Xi_{1}, (35)

where Ξ1=z1μ1(f1+g1e2y˙d)+z1μ2\Xi_{1}=z_{1}\mu_{1}(f_{1}+g_{1}e_{2}-\dot{y}_{d})+z_{1}\mu_{2}. Upon using Assumptions 1-3 and Young’s inequality, we have

z1μ1y˙dg¯1z12μ12y˙d2+14g¯1,\displaystyle-z_{1}\mu_{1}\dot{y}_{d}\leq\underline{g}_{1}z_{1}^{2}\mu_{1}^{2}\dot{y}_{d}^{2}+\frac{1}{4\underline{g}_{1}}, (36)
z1μ1f1g¯1z12μ12b12ϕ12+14g¯1,\displaystyle z_{1}\mu_{1}f_{1}\leq\underline{g}_{1}z_{1}^{2}\mu_{1}^{2}b_{1}^{2}\phi_{1}^{2}+\frac{1}{4\underline{g}_{1}}, (37)
z1μ1g1e2g¯2z12μ12e22+g¯124g¯2,\displaystyle z_{1}\mu_{1}g_{1}e_{2}\leq\underline{g}_{2}z_{1}^{2}\mu_{1}^{2}e_{2}^{2}+\frac{\bar{g}_{1}^{2}}{4\underline{g}_{2}}, (38)
z1μ2g¯1z12μ22+14g¯1.\displaystyle z_{1}\mu_{2}\leq\underline{g}_{1}z_{1}^{2}\mu_{2}^{2}+\frac{1}{4\underline{g}_{1}}. (39)

Therefore, Ξ1\Xi_{1} in (4) is bounded by

Ξ1g¯1θ1z12Φ1+g¯2z12μ12e22+34g¯1+g¯124g¯2\displaystyle\Xi_{1}\leq\underline{g}_{1}\theta_{1}z_{1}^{2}\Phi_{1}+\underline{g}_{2}z_{1}^{2}\mu_{1}^{2}e_{2}^{2}+\frac{3}{4\underline{g}_{1}}+\frac{\bar{g}_{1}^{2}}{4\underline{g}_{2}} (40)

with

θ1=max{1,b12},\displaystyle\theta_{1}=\max\left\{1,b_{1}^{2}\right\}, (41)
Φ1=μ12y˙d2+μ12ϕ12+μ22.\displaystyle\Phi_{1}=\mu_{1}^{2}\dot{y}_{d}^{2}+\mu_{1}^{2}\phi_{1}^{2}+\mu_{2}^{2}. (42)

We develop the virtual control input α1\alpha_{1} as

α1=1μ1(c1z1+z1θ^1Φ1),\displaystyle\alpha_{1}=-\frac{1}{\mu_{1}}(c_{1}z_{1}+z_{1}\hat{\theta}_{1}\Phi_{1}), (43)
θ^˙1=r1z12Φ1σ1θ^1,θ^1(0)0\displaystyle\dot{\hat{\theta}}_{1}=r_{1}z_{1}^{2}\Phi_{1}-\sigma_{1}\hat{\theta}_{1},~{}~{}\hat{\theta}_{1}(0)\geq 0 (44)

where c1c_{1}, r1r_{1}, and σ1\sigma_{1} are positive constants, and θ^1\hat{\theta}_{1} is the estimation of θ1\theta_{1}.

Consider the following Lyapunov function

V1=12z12+g¯12r1θ~12,\displaystyle V_{1}=\frac{1}{2}z_{1}^{2}+\frac{\underline{g}_{1}}{2r_{1}}\tilde{\theta}_{1}^{2},

where θ~1=θ1θ^1\tilde{\theta}_{1}=\theta_{1}-\hat{\theta}_{1}. Then, from (4), (40), (43) and (44), its time derivative can be derived as

V˙1=\displaystyle\dot{V}_{1}= z1μ1g1α1+Ξ1g¯1r1θ~1θ^˙1\displaystyle z_{1}\mu_{1}g_{1}\alpha_{1}+\Xi_{1}-\frac{\underline{g}_{1}}{r_{1}}\tilde{\theta}_{1}\dot{\hat{\theta}}_{1}
\displaystyle\leq c1g¯1z12+g¯2z12μ12e22+34g¯1+g¯124g¯2+g¯1σ1r1θ~1θ^1.\displaystyle-c_{1}\underline{g}_{1}z_{1}^{2}+\underline{g}_{2}z_{1}^{2}\mu_{1}^{2}e_{2}^{2}+\frac{3}{4\underline{g}_{1}}+\frac{\bar{g}_{1}^{2}}{4\underline{g}_{2}}+\frac{\underline{g}_{1}\sigma_{1}}{r_{1}}\tilde{\theta}_{1}\hat{\theta}_{1}.

Based on the definition of θ~1\tilde{\theta}_{1}, it yields

θ~1θ^1=θ~1(θ1θ~1)12θ~12+12θ12.\displaystyle\tilde{\theta}_{1}\hat{\theta}_{1}=\tilde{\theta}_{1}(\theta_{1}-\tilde{\theta}_{1})\leq-\frac{1}{2}\tilde{\theta}_{1}^{2}+\frac{1}{2}\theta_{1}^{2}.

We then have

V˙1\displaystyle\dot{V}_{1}\leq c1g¯1z12σ¯1θ~12+g¯2z12μ12e22+ε1,\displaystyle-c_{1}\underline{g}_{1}z_{1}^{2}-\bar{\sigma}_{1}\tilde{\theta}_{1}^{2}+\underline{g}_{2}z_{1}^{2}\mu_{1}^{2}e_{2}^{2}+\varepsilon_{1}, (45)

where σ¯1=g¯1σ12r1\bar{\sigma}_{1}=\frac{\underline{g}_{1}\sigma_{1}}{2r_{1}} and ε1=34g¯1+g¯124g¯2+g¯1σi2r1θ12\varepsilon_{1}=\frac{3}{4\underline{g}_{1}}+\frac{\bar{g}_{1}^{2}}{4\underline{g}_{2}}+\frac{\underline{g}_{1}\sigma_{i}}{2r_{1}}\theta_{1}^{2} is a bounded signal. Notice that the item g¯2z12μ12e22\underline{g}_{2}z_{1}^{2}\mu_{1}^{2}e_{2}^{2} will be tackled in the next step.

Step 2: From (30) and (32), the time derivative of e2e_{2} is

e˙2=x˙2α˙1=f2+g2uα˙1,\displaystyle\dot{e}_{2}=\dot{x}_{2}-\dot{\alpha}_{1}=f_{2}+g_{2}u-\dot{\alpha}_{1}, (46)

with

α˙1=α1x1(f1+g1x2)+Δα1,\displaystyle\dot{\alpha}_{1}=\frac{\partial\alpha_{1}}{\partial x_{1}}(f_{1}+g_{1}x_{2})+\Delta\alpha_{1}, (47)

where Δα1=k=01α1yd(k)yd(k+1)+k=01α1ρ(k)ρ(k+1)+k=01α1ηu(k)η˙u(k+1)+k=01α1ηl(k)η˙l(k+1)+α1θ^1θ^˙1\Delta\alpha_{1}=\sum_{k=0}^{1}\frac{\partial\alpha_{1}}{\partial y_{d}^{(k)}}y_{d}^{(k+1)}+\sum_{k=0}^{1}\frac{\partial\alpha_{1}}{\partial\rho^{(k)}}\rho^{(k+1)}+\sum_{k=0}^{1}\frac{\partial\alpha_{1}}{\partial\eta_{u}^{(k)}}\dot{\eta}_{u}^{(k+1)}+\sum_{k=0}^{1}\frac{\partial\alpha_{1}}{\partial\eta_{l}^{(k)}}\dot{\eta}_{l}^{(k+1)}+\frac{\partial\alpha_{1}}{\partial\hat{\theta}_{1}}\dot{\hat{\theta}}_{1}, which is computable. According to the definition of Δv(t)\Delta v(t), we can obtain

u(t)=v(t)Δv(t),|Δv(t)|p¯,\displaystyle u(t)=v(t)-\Delta v(t),~{}|\Delta v(t)|\leq\bar{p}, (48)

where p¯=max{ω0p0,ω1p,,ωscpsc}\bar{p}=\max\{\omega_{0}p^{0},\omega_{1}p,\dots,\omega_{s_{c}}p^{s_{c}}\} is a positive constant. We then consider the Lyapunov function V2V_{2}:

V2=V1+12e22+g¯22r2θ~22,\displaystyle V_{2}=V_{1}+\frac{1}{2}e_{2}^{2}+\frac{\underline{g}_{2}}{2r_{2}}\tilde{\theta}_{2}^{2}, (49)

where θ~2=θ2θ^2\tilde{\theta}_{2}=\theta_{2}-\hat{\theta}_{2}, θ^2\hat{\theta}_{2} is the estimation of θ2\theta_{2} in (53), and r2r_{2} is a positive constant. The time derivative of V2V_{2}, along (46)-(48), is derived

V˙2=\displaystyle\dot{V}_{2}= V˙1+e2e˙2g¯2r2θ~2θ^˙2\displaystyle\dot{V}_{1}+e_{2}\dot{e}_{2}-\frac{\underline{g}_{2}}{r_{2}}\tilde{\theta}_{2}\dot{\hat{\theta}}_{2}
\displaystyle\leq c1g¯1z12σ¯1θ~12+e2g2vg¯2r2θ~2θ^˙2+Ξ2+ε1\displaystyle-c_{1}\underline{g}_{1}z_{1}^{2}-\bar{\sigma}_{1}\tilde{\theta}_{1}^{2}+e_{2}g_{2}v-\frac{\underline{g}_{2}}{r_{2}}\tilde{\theta}_{2}\dot{\hat{\theta}}_{2}+\Xi_{2}+\varepsilon_{1} (50)

where Ξ2=e2(f2α1x1(f1+g1x2)Δα1)e2g2Δv+g¯2z12μ12e22\Xi_{2}=e_{2}(f_{2}-\frac{\partial\alpha_{1}}{\partial x_{1}}(f_{1}+g_{1}x_{2})-\Delta\alpha_{1})-e_{2}g_{2}\Delta v+\underline{g}_{2}z_{1}^{2}\mu_{1}^{2}e_{2}^{2}. Using Young’s inequality, we can also expand Ξ2\Xi_{2} as inequalities in (36)-(39). Note that the control input signal will be updated whenever the coded event-triggered scheme (7) is triggered, which indicates that |Δv|ωpβ|\Delta v|\leq\omega p^{\beta} holds. As ω\omega, β\beta and pp are all bounded numbers, from (48), it can be derived that p¯\bar{p} is a bounded constant, leading to:

e2g2Δvg¯2e¯22+g¯224g¯2p¯2.\displaystyle-e_{2}g_{2}\Delta v\leq\underline{g}_{2}\bar{e}_{2}^{2}+\frac{\bar{g}_{2}^{2}}{4\underline{g}_{2}}\bar{p}^{2}. (51)

It yields that

Ξ2g¯2θ2e22Φ2+34g¯2+g¯124g¯2+g¯224g¯2p¯2,\displaystyle\Xi_{2}\leq\underline{g}_{2}\theta_{2}e_{2}^{2}\Phi_{2}+\frac{3}{4\underline{g}_{2}}+\frac{\bar{g}_{1}^{2}}{4\underline{g}_{2}}+\frac{\bar{g}_{2}^{2}}{4\underline{g}_{2}}\bar{p}^{2}, (52)

where

θ2=max{1,b12,b22},\displaystyle\theta_{2}=\max\left\{1,b_{1}^{2},b_{2}^{2}\right\}, (53)
Φ2=(α1x1ϕ1)2+(α1x1x2)2+(Δα1)2+μ12z12+ϕ22+1.\displaystyle\Phi_{2}=(\frac{\partial\alpha_{1}}{\partial x_{1}}\phi_{1})^{2}+(\frac{\partial\alpha_{1}}{\partial x_{1}}x_{2})^{2}\!+\!(\Delta\alpha_{1})^{2}+\mu_{1}^{2}z_{1}^{2}\!+\!\phi_{2}^{2}\!+\!1. (54)

To move forward, the actual control is developed as

v(t)=(c2e2+θ^2e2Φ2),\displaystyle v(t)=-(c_{2}e_{2}+\hat{\theta}_{2}e_{2}\Phi_{2}), (55)
θ^˙2=r2e22Φ2σ2θ^2,θ^2(0)0\displaystyle\dot{\hat{\theta}}_{2}=r_{2}e_{2}^{2}\Phi_{2}-\sigma_{2}\hat{\theta}_{2},~{}~{}\hat{\theta}_{2}(0)\geq 0 (56)

where c2,r2,σ2>0c_{2},r_{2},\sigma_{2}>0 and θ^2\hat{\theta}_{2} is the estimation of θ2\theta_{2}. By (52)-(56), the inequality (4) can be rewritten as

V˙2\displaystyle\dot{V}_{2}\leq c1g¯1z12σ¯1θ~12g¯2c2e22+σ2g¯2r2θ~2θ^2\displaystyle-c_{1}\underline{g}_{1}z_{1}^{2}-\bar{\sigma}_{1}\tilde{\theta}_{1}^{2}-\underline{g}_{2}c_{2}e_{2}^{2}+\frac{\sigma_{2}\underline{g}_{2}}{r_{2}}\tilde{\theta}_{2}\hat{\theta}_{2}
+34g¯2+g¯124g¯2+g¯224g¯2p¯2+ε1.\displaystyle+\frac{3}{4\underline{g}_{2}}+\frac{\bar{g}_{1}^{2}}{4\underline{g}_{2}}+\frac{\bar{g}_{2}^{2}}{4\underline{g}_{2}}\bar{p}^{2}+\varepsilon_{1}. (57)

Based on the definition of θ~2\tilde{\theta}_{2}, we obtain

θ~2θ^2=θ~2(θ2θ~2)12θ~22+12θ22.\displaystyle\tilde{\theta}_{2}\hat{\theta}_{2}=\tilde{\theta}_{2}(\theta_{2}-\tilde{\theta}_{2})\leq-\frac{1}{2}\tilde{\theta}_{2}^{2}+\frac{1}{2}\theta_{2}^{2}. (58)

By substituting (58) into (4) yields

V˙2\displaystyle\dot{V}_{2}\leq c1g¯1z12σ¯1θ~12g¯2c2e22σ¯2θ~22+ε2,\displaystyle-c_{1}\underline{g}_{1}z_{1}^{2}-\bar{\sigma}_{1}\tilde{\theta}_{1}^{2}-\underline{g}_{2}c_{2}e_{2}^{2}-\bar{\sigma}_{2}\tilde{\theta}_{2}^{2}+\varepsilon_{2}, (59)

where σ¯2=g¯2σ22r2\bar{\sigma}_{2}=\frac{\underline{g}_{2}\sigma_{2}}{2r_{2}} and ε2=g¯2σ22r2θ22+34g¯2+g¯124g¯2+g¯224g¯2p¯2+ε1\varepsilon_{2}=\frac{\underline{g}_{2}\sigma_{2}}{2r_{2}}\theta_{2}^{2}+\frac{3}{4\underline{g}_{2}}+\frac{\bar{g}_{1}^{2}}{4\underline{g}_{2}}+\frac{\bar{g}_{2}^{2}}{4\underline{g}_{2}}\bar{p}^{2}+\varepsilon_{1}.

To summarize, we establish the following theorem.

Theorem 1.

Consider the second-order nonlinear system (30) under Assumptions 1-3. The virtual control α1\alpha_{1} and the actual control input v(t)v(t) are developed in (43) and (55). The adaptive laws are given by (44) and (56). Following the Coded Event-triggered Scheme (6)-(7), the proposed control method guarantees the following.

  1. (i)

    The tracking error e1e_{1} satisfies Entry Capture Problem property since it is strictly constrained by the prescribed performance: el(t)<e1(t)<eu(t)-e_{l}(t)<e_{1}(t)<e_{u}(t) right after an user-given finite time TT as presented in Definition 1;

  2. (ii)

    All signals in the closed-loop system are guaranteed to be bounded regardless of initial conditions; and

  3. (iii)

    Zeno behavior is excluded.

Proof.

By revisiting (59), there is

V˙2\displaystyle\dot{V}_{2}\leq c1g¯1z12σ¯1θ~12g¯2c2e22σ¯2θ~22+ε2\displaystyle-c_{1}\underline{g}_{1}z_{1}^{2}-\bar{\sigma}_{1}\tilde{\theta}_{1}^{2}-\underline{g}_{2}c_{2}e_{2}^{2}-\bar{\sigma}_{2}\tilde{\theta}_{2}^{2}+\varepsilon_{2}
\displaystyle\leq πV2+ε2,\displaystyle-\pi V_{2}+\varepsilon_{2},

where π=min{2c1g¯1,2c2g¯2,2r1σ¯1g¯1,2r2σ¯2g¯2}>0\pi=\min\{2c_{1}\underline{g}_{1},2c_{2}\underline{g}_{2},2\frac{r_{1}\bar{\sigma}_{1}}{\underline{g}_{1}},2\frac{r_{2}\bar{\sigma}_{2}}{\underline{g}_{2}}\}>0. Subsequently, we can have

0V2(t)ε2π+(V2(0)ε2π)eπt.\displaystyle 0\leq V_{2}(t)\leq\frac{\varepsilon_{2}}{\pi}+(V_{2}(0)-\frac{\varepsilon_{2}}{\pi})e^{-\pi t}.

It can be concluded that V2V_{2} is bounded which guarantees the boundedness of z1z_{1}, e2e_{2}, θ~1\tilde{\theta}_{1}, and θ~2\tilde{\theta}_{2}. From the error transformation function in (33), it is certain that El(t)<e1(t)<Eu(t)-E_{l}(t)<e_{1}(t)<E_{u}(t) holds due to z1Lz_{1}\in L_{\infty}. According to Lemma 1, e1e_{1} satisfies el(t)<e1(t)<eu(t)-e_{l}(t)<e_{1}(t)<e_{u}(t) for tTt\geq T, which indicates that e1e_{1} follows the Entry Capture Problem in Definition 1.

Next, other tracking signals in the closed-loop system are proved to be bounded. Considering the adaptive laws (44) and (56), θ1,θ2,θ^˙1\theta_{1},\theta_{2},\dot{\hat{\theta}}_{1} and θ^˙2\dot{\hat{\theta}}_{2} remain bounded. The virtual control input α1\alpha_{1} defined in (43) belong to LL_{\infty}. Moreover, by (55), the boundedness of actual control signal v(t)v(t) is guaranteed. From (31) and (32), it can be derived that x1x_{1} and x2x_{2} also keep bounded. All the closed-loop signals are therefore bounded for the second-order nonlinear system under any initial condition.

To illustrate the exclusion of Zeno behavior, the time derivative of Δv(t)\Delta v(t) during the inter-execution interval is given

Δv˙(t)=v˙(t)v˙(tk)=v˙(t),tkt<tk+1,\displaystyle\Delta\dot{v}(t)=\dot{v}(t)-\dot{v}(t_{k})=\dot{v}(t),~{}t_{k}\leq t<t_{k+1},

where k=1,2,k=1,2,\dots By (55), it yields v˙(t)=k=12vxkx˙k+k=02vyd(k)yd(k+1)+k=12vθ^kθ^˙k+k=02vρ(k)ρ(k+1)+k=02vηu(k)η˙u(k+1)+k=02vηl(k)η˙l(k+1)\dot{v}(t)=\sum_{k=1}^{2}\frac{\partial v}{\partial x_{k}}\dot{x}_{k}+\sum_{k=0}^{2}\frac{\partial v}{\partial y_{d}^{(k)}}y_{d}^{(k+1)}+\sum_{k=1}^{2}\frac{\partial v}{\partial\hat{\theta}_{k}}\dot{\hat{\theta}}_{k}+\sum_{k=0}^{2}\frac{\partial v}{\partial\rho^{(k)}}\rho^{(k+1)}+\sum_{k=0}^{2}\frac{\partial v}{\partial\eta_{u}^{(k)}}\dot{\eta}_{u}^{(k+1)}+\sum_{k=0}^{2}\frac{\partial v}{\partial\eta_{l}^{(k)}}\dot{\eta}_{l}^{(k+1)}. In accordance with Assumptions 1-3, Definition 2, prescribed performance functions eu(t)e_{u}(t) and el(t)e_{l}(t) defined in (26)-(27), and the fact that e˙2\dot{e}_{2} governed by (46) and other closed-loop signals remain bounded, the boundedness of v˙\dot{v} is ensured. For convenience, the upper bound of |v˙||\dot{v}| can be specified by a positive constant κ\kappa. Therefore, we can obtain

|Δv˙(t)|κ,tkt<tk+1,\displaystyle|\Delta\dot{v}(t)|\leq\kappa,~{}t_{k}\leq t<t_{k+1},

where k=1,2,k=1,2,\dots Given that limttk+|Δv|=0\lim_{t\rightarrow t_{k}^{+}}|\Delta v|=0 and limttk+1|Δv|=ωpβ\lim_{t\rightarrow t_{k+1}^{-}}|\Delta v|=\omega p^{\beta}, it indicates that there exists a strictly positive constant t=ωpβκt^{*}=\frac{\omega p^{\beta}}{\kappa} such that

tk+1tkt,k=1,2,\displaystyle t_{k+1}-t_{k}\geq t^{*},~{}k=1,2,\dots

with tt^{*} denoting minimal inter-transmission interval. Thereby, the Zeno behavior is excluded and the proof is completed. ∎

5 Coded Event-triggered Control for high-order System

In this section, the proposed CEC will be extended to nnth-order systems (4). Instead of step-by-step procedure, its control design is omitted here for conciseness since its stability analysis is identical to the second-order system (30).

We first define the tracking error variables:

e1=x1yd\displaystyle e_{1}=x_{1}-y_{d} (60)
ei=xiαi1,i=2,,n,\displaystyle e_{i}=x_{i}-\alpha_{i-1},~{}i=2,\dots,n, (61)

where αi1\alpha_{i-1} represent virtual control inputs. In order to guarantee e1e_{1} fulfilling the Self-adjustable Prescribed Performance (23), we introduce the following error transformation function:

z1=ln(El+e1Eue1)\displaystyle z_{1}=\ln\left(\frac{E_{l}+e_{1}}{E_{u}-e_{1}}\right) (62)

Then, the virtual control inputs are designed as

α1=1μ1(c1z1+z1θ^1Φ1),\displaystyle\alpha_{1}=-\frac{1}{\mu_{1}}(c_{1}z_{1}+z_{1}\hat{\theta}_{1}\Phi_{1}), (63)
αi=(ciei+θ^ieiΦi),i=2,,n1,\displaystyle\alpha_{i}=-(c_{i}e_{i}+\hat{\theta}_{i}e_{i}\Phi_{i}),~{}i=2,\dots,n-1, (64)

and the adaptive laws are updated by

θ^˙1=r1z12Φ1σ1θ^1,θ^1(0)0,\displaystyle\dot{\hat{\theta}}_{1}=r_{1}z_{1}^{2}\Phi_{1}-\sigma_{1}\hat{\theta}_{1},~{}~{}\hat{\theta}_{1}(0)\geq 0, (65)
θ^˙i=riei2Φiσiθ^i,θ^i(0)0,\displaystyle\dot{\hat{\theta}}_{i}=r_{i}e_{i}^{2}\Phi_{i}-\sigma_{i}\hat{\theta}_{i},~{}~{}\hat{\theta}_{i}(0)\geq 0, (66)

for i=2,,n1i=2,\dots,n-1, where cic_{i}, rir_{i} and σi\sigma_{i}, i=1,,n1i=1,\dots,n-1, are positive constants. θ^i\hat{\theta}_{i} is the estimation of θi\theta_{i}, and Φi\Phi_{i} is a computable function, where θi\theta_{i} and Φi\Phi_{i} are

θi=max{1,b12,b22,,bi2},i=1,,n1,\displaystyle\theta_{i}=\max\{1,b_{1}^{2},b_{2}^{2},\dots,b_{i}^{2}\},~{}i=1,\dots,n-1, (67)
Φ1=μ12y˙d2+μ12ϕ12+μ22,\displaystyle\Phi_{1}=\mu_{1}^{2}\dot{y}_{d}^{2}+\mu_{1}^{2}\phi_{1}^{2}+\mu_{2}^{2}, (68)
Φ2=(α1x1ϕ1)2+(α1x1x2)2+(Δα1)2+μ12z12+ϕ22,\displaystyle\Phi_{2}=(\frac{\partial\alpha_{1}}{\partial x_{1}}\phi_{1})^{2}\!+\!(\frac{\partial\alpha_{1}}{\partial x_{1}}x_{2})^{2}+(\Delta\alpha_{1})^{2}+\mu_{1}^{2}z_{1}^{2}\!+\phi_{2}^{2}, (69)
Φi=k=1i1(αi1xkϕk)2+k=1i1(αi1xkxk+1)2+(Δαi1)2\displaystyle\Phi_{i}=\sum_{k=1}^{i-1}(\frac{\partial\alpha_{i-1}}{\partial x_{k}}\phi_{k})^{2}+\sum_{k=1}^{i-1}(\frac{\partial\alpha_{i-1}}{\partial x_{k}}x_{k+1})^{2}+(\Delta\alpha_{i-1})^{2}
+ei12+ϕi2,i=3,,n1,\displaystyle~{}~{}~{}~{}~{}~{}~{}+e_{i-1}^{2}+\phi_{i}^{2},~{}i=3,\dots,n-1, (70)

where μ1=(Eu+El)\mu_{1}=\ell(E_{u}+E_{l}) and μ2=(e˙lη˙l)(Eue1)(e˙u+η˙u)(El+e1)\mu_{2}=\ell(\dot{e}_{l}-\dot{\eta}_{l})(E_{u}-e_{1})-(\dot{e}_{u}+\dot{\eta}_{u})(E_{l}+e_{1}) and =1(e1+El)(Eue1)\ell=\frac{1}{(e_{1}+E_{l})(E_{u}-e_{1})}. We can also derived that Eu(t)+El(t)>0E_{u}(t)+E_{l}(t)>0 and (Eu(t)e1(t))(El(t)+el(t))>0(E_{u}(t)-e_{1}(t))(E_{l}(t)+e_{l}(t))>0 are bounded functions if e1(t)e_{1}(t) belongs to a compact set Ωe1={e1(t):El(t)<e1(t)<Eu(t)}\Omega_{e_{1}}=\{e_{1}(t)\in\mathbb{R}:-E_{l}(t)<e_{1}(t)<E_{u}(t)\}. Therefore, we have μ10\mu_{1}\neq 0 and μ1L\mu_{1}\in L_{\infty}. Identically, the actual control input and the adaptive law are developed:

v(t)=(cnen+θ^nenΦn),\displaystyle v(t)=-(c_{n}e_{n}+\hat{\theta}_{n}e_{n}\Phi_{n}), (71)
θ^˙n=rnen2Φnσnθ^n,θ^n(0)0,\displaystyle\dot{\hat{\theta}}_{n}=r_{n}e_{n}^{2}\Phi_{n}-\sigma_{n}\hat{\theta}_{n},~{}~{}\hat{\theta}_{n}(0)\geq 0, (72)

where rn,rn,σn>0r_{n},r_{n},\sigma_{n}>0, θ^n\hat{\theta}_{n} denotes the estimation of θn\theta_{n} and Φn\Phi_{n} is a computable function. Similar to (67)-(70), we have

θn=max{1,b12,b22,,bn2},\displaystyle\theta_{n}=\max\{1,b_{1}^{2},b_{2}^{2},\dots,b_{n}^{2}\}, (73)
Φn=k=1n1(αi1xkϕk)2+k=1n1(αi1xkxk+1)2+(Δαn1)2\displaystyle\Phi_{n}=\sum_{k=1}^{n-1}(\frac{\partial\alpha_{i-1}}{\partial x_{k}}\phi_{k})^{2}+\sum_{k=1}^{n-1}(\frac{\partial\alpha_{i-1}}{\partial x_{k}}x_{k+1})^{2}+(\Delta\alpha_{n-1})^{2}
+en12+ϕn2+1.\displaystyle~{}~{}~{}~{}~{}~{}~{}+e_{n-1}^{2}+\phi_{n}^{2}+1. (74)

In the following theorem, we summarize the result on the Coded Event-triggered Control for the nnth-order nonlinear systems.

Theorem 2.

Consider nnth-order nonlinear systems (4) under Assumptions 1-3. If the control inputs and the adaptive laws are designed as (67)-(72), by adopting the Coded Event-triggered Scheme (6)-(7), we can guarantee the following properties:

  1. (i)

    Given any initial condition, the tracking error e1(t)e_{1}(t) is constrained by the prescribed performance: el(t)<e1(t)<eu(t)-e_{l}(t)<e_{1}(t)<e_{u}(t), for tTt\geq T with TT being a preassigned finite time, that is, e1e_{1} fulfills Entry Capture Problem properties in Definition 1;

  2. (ii)

    All signals in the closed-loop system are guaranteed to be bounded regardless of initial conditions;

  3. (iii)

    Zeno behavior is excluded.

Proof.

Consider the following Lyapunov candidates:

V1=12z12+g¯12r1θ~12,\displaystyle V_{1}=\frac{1}{2}z_{1}^{2}+\frac{\underline{g}_{1}}{2r_{1}}\tilde{\theta}_{1}^{2},
Vi=Vi1+12en2+g¯n2rnθ~n2.\displaystyle V_{i}=V_{i-1}+\frac{1}{2}e_{n}^{2}+\frac{\underline{g}_{n}}{2r_{n}}\tilde{\theta}_{n}^{2}.

where θ~i=θiθ^i,i=1,,n\tilde{\theta}_{i}=\theta_{i}-\hat{\theta}_{i},i=1,\dots,n. Similar to the stability analysis in Theorem 1, it can be also derived:

V˙n\displaystyle\dot{V}_{n}\leq c1g¯1z12k=2nckg¯kek2k=1nσ¯kθ~k2+εn\displaystyle-c_{1}\underline{g}_{1}z_{1}^{2}-\sum_{k=2}^{n}c_{k}\underline{g}_{k}e_{k}^{2}-\sum_{k=1}^{n}\bar{\sigma}_{k}\tilde{\theta}_{k}^{2}+\varepsilon_{n}
\displaystyle\leq πVn+εn,\displaystyle-\pi V_{n}+\varepsilon_{n},

where π=min{2c1g¯1,,2cng¯n,2r1σ¯1g¯1,,2rnσ¯ng¯n}>0\pi=\min\{2c_{1}\underline{g}_{1},\dots,2c_{n}\underline{g}_{n},2\frac{r_{1}\bar{\sigma}_{1}}{\underline{g}_{1}},\dots,2\frac{r_{n}\bar{\sigma}_{n}}{\underline{g}_{n}}\}>0, εn=g¯nσn2rnθn2+34g¯n+g¯n124g¯n+g¯n24g¯np¯2+ε1\varepsilon_{n}=\frac{\underline{g}_{n}\sigma_{n}}{2r_{n}}\theta_{n}^{2}+\frac{3}{4\underline{g}_{n}}+\frac{\bar{g}_{n-1}^{2}}{4\underline{g}_{n}}+\frac{\bar{g}_{n}^{2}}{4\underline{g}_{n}}\bar{p}^{2}+\varepsilon_{1}. In accordance with (6)-(7), we have |Δv(t)|p¯|\Delta v(t)|\leq\bar{p}, where p¯=max{ω0p0,ω1p,,ωscpsc}\bar{p}=\max\{\omega_{0}p^{0},\omega_{1}p,\dots,\omega_{s_{c}}p^{s_{c}}\} is a bounded constant. Then, we obtain

0Vn(t)εnπ+(Vn(0)εnπ)eπt.\displaystyle 0\leq V_{n}(t)\leq\frac{\varepsilon_{n}}{\pi}+(V_{n}(0)-\frac{\varepsilon_{n}}{\pi})e^{-\pi t}.

It indicates that Vn(t)V_{n}(t) is bounded, leading to z1z_{1}, e2,,ene_{2},\dots,e_{n}, θ~1,,θ~nL\tilde{\theta}_{1},\dots,\tilde{\theta}_{n}\in L_{\infty}. According to the error transformation function (62), we can derive that e1e_{1} is evolving within the SPP, namely, El(t)<e1(t)<Eu(t)-E_{l}(t)<e_{1}(t)<E_{u}(t). Based on Lemma 1, the Entry Capture Problem is achieved, that is, el(t)<e1(t)<eu(t)-e_{l}(t)<e_{1}(t)<e_{u}(t) for all tTt\geq T.

Next, the boundedness of other signals in the closed-loop system is proved. From (65)-(67) and (72)-(73), and the definition of θ~i\tilde{\theta}_{i}, it leads to θ^i\hat{\theta}_{i} and θ^˙iL\dot{\hat{\theta}}_{i}\in L_{\infty}, for i=1,,ni=1,\dots,n. By (63)-(64) and (71), the boundedness of control input signals α1,,αn1,v\alpha_{1},\dots,\alpha_{n-1},v is guaranteed. Considering (60)-(61), x1,,xnx_{1},\dots,x_{n} belong to LL_{\infty}. Therefore, all signals in the closed-loop system are bounded.

To verify the exclusion of Zeno phenomenon, the time derivative of Δv(t)\Delta v(t) before next triggering is given

Δv˙(t)=v˙(t)v˙(tk)=v˙(t),tkt<tk+1.\displaystyle\Delta\dot{v}(t)=\dot{v}(t)-\dot{v}(t_{k})=\dot{v}(t),~{}t_{k}\leq t<t_{k+1}.

where k=1,2,k=1,2,\dots By invoking (71), there has v˙(t)=k=1nvxkx˙k+k=0nvyd(k)yd(k+1)+k=1nvθ^kθ^˙k+k=0nvρ(k)ρ(k+1)+k=0nvηu(k)η˙u(k+1)+k=0nvηl(k)η˙l(k+1)\dot{v}(t)=\sum_{k=1}^{n}\frac{\partial v}{\partial x_{k}}\dot{x}_{k}+\sum_{k=0}^{n}\frac{\partial v}{\partial y_{d}^{(k)}}y_{d}^{(k+1)}+\sum_{k=1}^{n}\frac{\partial v}{\partial\hat{\theta}_{k}}\dot{\hat{\theta}}_{k}+\sum_{k=0}^{n}\frac{\partial v}{\partial\rho^{(k)}}\rho^{(k+1)}+\sum_{k=0}^{n}\frac{\partial v}{\partial\eta_{u}^{(k)}}\dot{\eta}_{u}^{(k+1)}+\sum_{k=0}^{n}\frac{\partial v}{\partial\eta_{l}^{(k)}}\dot{\eta}_{l}^{(k+1)}. Since all the signals in the closed-loop system are bounded, from Assumptions 1-3, Definition 2, prescribed performance functions eu(t)e_{u}(t) and el(t)e_{l}(t) defined in (26)-(26), v˙(t)\dot{v}(t) is, therefore, bounded by

|Δv˙(t)|κ,tkt<tk+1,\displaystyle|\Delta\dot{v}(t)|\leq\kappa,~{}t_{k}\leq t<t_{k+1},

where k=1,2,k=1,2,\dots Given that limttk+|Δv|=0\lim_{t\rightarrow t_{k}^{+}}|\Delta v|=0 and limttk+1|Δv|=ωpβ\lim_{t\rightarrow t_{k+1}^{-}}|\Delta v|=\omega p^{\beta}, it indicates that there exists a strictly positive constant t=ωpβκt^{*}=\frac{\omega p^{\beta}}{\kappa} such that

tk+1tkt,k=1,2,\displaystyle t_{k+1}-t_{k}\geq t^{*},~{}k=1,2,\dots

with tt^{*} being the minimal inter-transmission interval. Thereby, the Zeno behavior is excluded and proof is completed. ∎

Remark 5.

We provide a guideline for the parameter selections. For the settling time TT in (5), its value should satisfy 0<Tmin<T0<T_{\min}<T where TminT_{\min} is the minimum time necessary for signal processing. This assumption is widely used in existing results Zhao et al. (2021); Song & Zhou (2018). If TT is chosen too small, although faster convergence, it could lead to large control signals. Considering the control parameters cic_{i} and σi\sigma_{i}, their values will determine the convergence rate and tracking accuracy. Note that their extreme values may lead to large control inputs, making systems sensitive to external disturbances. Therefore, these parameters’ selections should consider the balance between tracking performance and system ability.

6 Simulation Results

To illustrate the effectiveness of our proposed CEC, some comparative simulations are conducted in this section. Consider the following second-order nonlinear system:

{x˙1=f1(x¯1)+g1(x¯1)x2,x˙2=f2(x¯2)+g2(x¯2)u,\displaystyle\left\{\begin{array}[]{ll}\dot{x}_{1}=f_{1}(\bar{x}_{1})+g_{1}(\bar{x}_{1})x_{2},\\ \dot{x}_{2}=f_{2}(\bar{x}_{2})+g_{2}(\bar{x}_{2})u,\end{array}\right. (77)

where f1(x¯1)=x12+0.1cos(0.5x1)f_{1}(\bar{x}_{1})=x_{1}^{2}+0.1\cos(0.5x_{1}), f2(x¯2)=4x1x2+x1e|x2|+0.05sin(x1x2)f_{2}(\bar{x}_{2})=4x_{1}x_{2}+x_{1}e^{-|x_{2}|}+0.05\sin(x_{1}x_{2}), g1(x¯1)=5+0.5sin(x1)g_{1}(\bar{x}_{1})=5+0.5\sin(x_{1}), and g2(x¯2)=3+0.2cos(x1x2)g_{2}(\bar{x}_{2})=3+0.2\cos(x_{1}x_{2}). By Assumption 2, it can be derived that |f1(x¯1)|x12+0.1|f_{1}(\bar{x}_{1})|\leq x_{1}^{2}+0.1 with b1=1b_{1}=1 and ϕ1=1+x12\phi_{1}=1+x_{1}^{2}, and |f2(x¯2)|3x12+2x22+0.3|f_{2}(\bar{x}_{2})|\leq 3x_{1}^{2}+2x_{2}^{2}+0.3 with b2=3b_{2}=3 and ϕ2=x12+x22+1\phi_{2}=x_{1}^{2}+x_{2}^{2}+1. The initial condition is set by x1(0)=1.5x_{1}(0)=1.5 and x2(0)=0x_{2}(0)=0. The desired tracking trajectory is yd=sin(0.5t)y_{d}=\sin(0.5t). The control parameters are selected as: m=3m=3 (i.e., β=0,1,2,3\beta=0,1,2,3 and ω=0.3,0.4,0.5,0.6\omega=0.3,0.4,0.5,0.6), T=4T=4, c1=2c_{1}=2, c2=15c_{2}=15, σ1=σ2=0.01\sigma_{1}=\sigma_{2}=0.01, r1=r2=0.002r_{1}=r_{2}=0.002, l=0.6l=0.6, λ=2\lambda=2, δ=0.5\delta=0.5, ρ0=1\rho_{0}=1, ρ=0.4\rho_{\infty}=0.4, and ς=1\varsigma=1. Moreover, our CEC is compared with our control design with relative threshold Xing et al. (2018) and switching threshold Xing et al. (2016).

(Case I) The simulation results of our CEC under different threshold strategies are shown in Figs. 3-4. From Fig. 3, the initial tracking error e1(0)e_{1}(0) violates the initial performance constraints colored in brown, leading to the classical prescribed control methods being inapplicable. By our CEC, we can regulate e1(0)e_{1}(0) into the allowable set within the given time TT. With the aid of SPP, bounded yet customizable virtual performance boundaries are established during the initial interval as shown in blue color. Therefore, the severe overshoot or unconstrained behaviors over [0,T)[0,T) are effectively avoided. On the other hand, the triggering time of three threshold strategies is shown in Fig. 4, and the number of triggering events and bit assumptions are summarized in the second and third columns of Table 2, in which we exclude the initial signal transmission. Due to m=3m=3 in the CES, it indicates that only a 3-bit string is transmitted for each communication when the event condition is satisfied. Compared with the relative threshold and the switching threshold where control inputs should be encoded by 8-bit strings before each transmission, our CES consumes fewer bits while maintaining the tracking performance, which is significant for the practical system with limited communication bandwidth.

Refer to caption
Figure 3: The tracking error e1(t)e_{1}(t) for case I.
Refer to caption
Figure 4: The triggering time for case I.
Table 2: The number of triggering events for different strategies
Case I Case II
different strategies trigger number bit consumption trigger number bit consumption
CES 332 996 460 1380
Relative threshold 339 2712 X X
Switching threshold 373 2984 403 3224
Refer to caption
Figure 5: The tracking error e1(t)e_{1}(t) for case II.
Refer to caption
Figure 6: The triggering time for case II.

(Case II) To further illustrate the effectiveness of our CES, we consider the introduction of external disturbance d(t)=2cos0.5td(t)=2\cos 0.5t during 5-10s in the second row of (77). The comparative results under different threshold strategies are shown in Figs. 5-6. Due to the signal distortion problem associated with the relative threshold strategy as discussed in Section 3.1, the tracking performance is severely degraded with e1(t)e_{1}(t) depicted by the green line violating performance constraints at 5.24s, as illustrated in Fig. 5. It makes the control design suffer from the singularity problem. Note that our CES and switching threshold strategy accomplish a good balance between tracking performance and network constraints. Therefore, they can guarantee the tracking errors within the allowable set even the introduced external disturbances. However, from the fourth and fifth columns of Table 2 and the triggering time in Fig. 6, our CES strategy can consume fewer bit resources compared to the switching threshold one. On the other hand, for each communication case, we only transmit an encrypted 33-bit string through the public network rather than the sensitive real control input in the switching threshold strategy. Therefore, our control design reduces the communication burden and addresses the security concern at the same time.

7 Conclusion

A Coded Event-triggered Control has been designed for a class of nonlinear systems under any initial condition. We have shown that such control method can not only consume less communication bandwidth, but also enhance secure communication capability, since only mm-length string is encoded and transmitted for each communication. An effort has been also made on developing Self-adjustable Prescribed Performance such that the initial condition-dependence restriction is removed, allowing the Entry Capture Problem to be collectively addressed. Note that our communication protocol is based on the magnitude of control input. In the future, we would like to design the protocol from the changing rate of the control signal to further enhance the tracking performance.

References

  • (1)
  • Åarzén (1999) Åarzén, K.-E. (1999), ‘A simple event-based pid controller’, IFAC Proceedings Volumes 32(2), 8687–8692.
  • Åström & Bernhardsson (1999) Åström, K. J. & Bernhardsson, B. (1999), ‘Comparison of periodic and event based sampling for first-order stochastic systems’, IFAC Proceedings Volumes 32(2), 5006–5011.
  • Bechlioulis & Rovithakis (2008) Bechlioulis, C. P. & Rovithakis, G. A. (2008), ‘Robust adaptive control of feedback linearizable mimo nonlinear systems with prescribed performance’, IEEE Transactions on Automatic Control 53(9), 2090–2099.
  • Berger et al. (2022) Berger, T., Puche, M. & Schwenninger, F. L. (2022), ‘Funnel control for a moving water tank’, Automatica 135, 109999.
  • Bu et al. (2023) Bu, X., Lv, M., Lei, H. & Cao, J. (2023), ‘Fuzzy neural pseudo control with prescribed performance for waverider vehicles: A fragility-avoidance approach’, IEEE Transactions on Cybernetics .
  • Chen & Hua (2020) Chen, J. & Hua, C. (2020), ‘Adaptive full-state-constrained control of nonlinear systems with deferred constraints based on nonbarrier lyapunov function method’, IEEE Transactions on Cybernetics 52(8), 7634–7642.
  • Deng et al. (2022) Deng, C., Wen, C., Wang, W., Li, X. & Yue, D. (2022), ‘Distributed adaptive tracking control for high-order nonlinear multi-agent systems over event-triggered communication’, IEEE Transactions on Automatic Control .
  • Dimarogonas et al. (2011) Dimarogonas, D. V., Frazzoli, E. & Johansson, K. H. (2011), ‘Distributed event-triggered control for multi-agent systems’, IEEE Transactions on Automatic Control 57(5), 1291–1297.
  • Ding et al. (2017) Ding, L., Han, Q.-L., Ge, X. & Zhang, X.-M. (2017), ‘An overview of recent advances in event-triggered consensus of multiagent systems’, IEEE transactions on cybernetics 48(4), 1110–1123.
  • Fan et al. (2013) Fan, Y., Feng, G., Wang, Y. & Song, C. (2013), ‘Distributed event-triggered control of multi-agent systems with combinational measurements’, Automatica 49(2), 671–675.
  • Girard (2014) Girard, A. (2014), ‘Dynamic triggering mechanisms for event-triggered control’, IEEE Transactions on Automatic Control 60(7), 1992–1997.
  • Heemels et al. (2012) Heemels, W. P., Johansson, K. H. & Tabuada, P. (2012), An introduction to event-triggered and self-triggered control, in ‘2012 ieee 51st ieee conference on decision and control (cdc)’, IEEE, pp. 3270–3285.
  • Ilchmann et al. (2002) Ilchmann, A., Ryan, E. P. & Sangwin, C. J. (2002), ‘Tracking with prescribed transient behaviour’, ESAIM: Control, Optimisation and Calculus of Variations 7, 471–493.
  • Ji, Li & Ge (2022) Ji, R., Li, D. & Ge, S. S. (2022), ‘Saturation-tolerant prescribed control for nonlinear time-delay systems’, IEEE Transactions on Fuzzy Systems .
  • Ji et al. (2023) Ji, R., Li, D., Ge, S. S. & Li, H. (2023), ‘Tunnel prescribed control of nonlinear systems with unknown control directions’, IEEE Transactions on Neural Networks and Learning Systems .
  • Ji, Li, Ma & Ge (2022) Ji, R., Li, D., Ma, J. & Ge, S. S. (2022), ‘Saturation-tolerant prescribed control of mimo systems with unknown control directions’, IEEE Transactions on Fuzzy Systems .
  • Jin (2018) Jin, X. (2018), ‘Adaptive fixed-time control for mimo nonlinear systems with asymmetric output constraints using universal barrier functions’, IEEE Transactions on Automatic Control 64(7), 3046–3053.
  • Krstic et al. (1995) Krstic, M., Kokotovic, P. V. & Kanellakopoulos, I. (1995), Nonlinear and adaptive control design, John Wiley & Sons, Inc.
  • Kumari et al. (2020) Kumari, K., Bandyopadhyay, B., Reger, J. & Behera, A. K. (2020), ‘Event-triggered sliding mode control for a high-order system via reduced-order model based design’, Automatica 121, 109163.
  • Liu et al. (2020) Liu, X., Su, X., Shi, P., Shen, C. & Peng, Y. (2020), ‘Event-triggered sliding mode control of nonlinear dynamic systems’, Automatica 112, 108738.
  • Liu et al. (2023) Liu, Y.-J., Xu, F. & Tang, L. (2023), ‘Tangent barrier lyapunov function based adaptive event-triggered control for uncertain flexible beam systems’, Automatica 152, 110976.
  • Mazo Jr & Cao (2014) Mazo Jr, M. & Cao, M. (2014), ‘Asynchronous decentralized event-triggered control’, Automatica 50(12), 3197–3203.
  • Polycarpou & Ioannou (1993) Polycarpou, M. M. & Ioannou, P. A. (1993), A robust adaptive nonlinear control design, in ‘1993 American control conference’, IEEE, pp. 1365–1369.
  • Song & Zhou (2018) Song, Y.-D. & Zhou, S. (2018), ‘Tracking control of uncertain nonlinear systems with deferred asymmetric time-varying full state constraints’, Automatica 98, 314–322.
  • Sun et al. (2022) Sun, J., Yang, J. & Zeng, Z. (2022), ‘Predictor-based periodic event-triggered control for nonlinear uncertain systems with input delay’, Automatica 136, 110055.
  • Tabuada (2007) Tabuada, P. (2007), ‘Event-triggered real-time scheduling of stabilizing control tasks’, IEEE Transactions on Automatic control 52(9), 1680–1685.
  • Wang & Krstic (2022) Wang, J. & Krstic, M. (2022), ‘Event-triggered adaptive control of coupled hyperbolic pdes with piecewise-constant inputs and identification’, IEEE Transactions on Automatic Control .
  • Xing et al. (2016) Xing, L., Wen, C., Liu, Z., Su, H. & Cai, J. (2016), ‘Event-triggered adaptive control for a class of uncertain nonlinear systems’, IEEE Transactions on Automatic Control 62(4), 2071–2076.
  • Xing et al. (2018) Xing, L., Wen, C., Liu, Z., Su, H. & Cai, J. (2018), ‘Event-triggered output feedback control for a class of uncertain nonlinear systems’, IEEE Transactions on Automatic Control 64(1), 290–297.
  • Zhang et al. (2020) Zhang, C., Chen, Z., Wang, J., Liu, Z. & Chen, C. P. (2020), ‘Fuzzy adaptive two-bit-triggered control for a class of uncertain nonlinear systems with actuator failures and dead-zone constraint’, IEEE Transactions on Cybernetics 51(1), 210–221.
  • Zhang et al. (2021) Zhang, J.-X., Wang, Q.-G. & Ding, W. (2021), ‘Global output-feedback prescribed performance control of nonlinear systems with unknown virtual control coefficients’, IEEE Transactions on Automatic Control .
  • Zhang & Yang (2020) Zhang, J.-X. & Yang, G.-H. (2020), ‘Event-triggered prescribed performance control for a class of unknown nonlinear systems’, IEEE Transactions on Systems, Man, and Cybernetics: Systems 51(10), 6576–6586.
  • Zhang, Che, Deng & Wu (2022) Zhang, L., Che, W.-W., Deng, C. & Wu, Z.-G. (2022), ‘Prescribed performance control for multiagent systems via fuzzy adaptive event-triggered strategy’, IEEE Transactions on Fuzzy Systems 30(12), 5078–5090.
  • Zhang, Wen, Zhao & Song (2022) Zhang, Z., Wen, C., Zhao, K. & Song, Y. (2022), ‘Decentralized adaptive control of uncertain interconnected systems with triggering state signals’, Automatica 141, 110283.
  • Zhao et al. (2021) Zhao, K., Song, Y., Chen, C. P. & Chen, L. (2021), ‘Adaptive asymptotic tracking with global performance for nonlinear systems with unknown control directions’, IEEE Transactions on Automatic Control 67(3), 1566–1573.
  • Zhao et al. (2017) Zhao, K., Song, Y., Ma, T. & He, L. (2017), ‘Prescribed performance control of uncertain euler–lagrange systems subject to full-state constraints’, IEEE transactions on neural networks and learning systems 29(8), 3478–3489.