• Tidak ada hasil yang ditemukan

Robust l2-l∞ Filtering for Discrete-Time Delay Systems | VU Research Repository | Victoria University | Melbourne Australia

N/A
N/A
Protected

Academic year: 2024

Membagikan "Robust l2-l∞ Filtering for Discrete-Time Delay Systems | VU Research Repository | Victoria University | Melbourne Australia"

Copied!
12
0
0

Teks penuh

(1)

Robust l2-l∞ Filtering for Discrete-Time Delay Systems

This is the Published version of the following publication

Yang, C, Yu, Z, Wang, P, Yu, Z, Karimi, H and Feng, Zhiguang (2013) Robust l2-l∞ Filtering for Discrete-Time Delay Systems. Mathematical Problems in Engineering, 2013. ISSN 1024-123X

The publisher’s official version can be found at https://www.hindawi.com/journals/mpe/2013/408941/

Note that access to this version may require subscription.

Downloaded from VU Research Repository https://vuir.vu.edu.au/35351/

(2)

Volume 2013, Article ID 408941,10pages http://dx.doi.org/10.1155/2013/408941

Research Article

Robust 𝑙 2 - 𝑙 Filtering for Discrete-Time Delay Systems

Chengming Yang,

1

Zhandong Yu,

1

Pinchao Wang,

2

Zhen Yu,

1

Hamid Reza Karimi,

3

and Zhiguang Feng

4

1College of Engineering, Bohai University, Jinzhou, Liaoning 121013, China

2School of Astronautics, Harbin Institute of Technology, Harbin, Heilongjiang 150001, China

3Department of Engineering, Faculty of Engineering and Science, University of Agder, 4898 Grimstad, Norway

4College of Information Science and Technology, Bohai University, Jinzhou, Liaoning 121013, China

Correspondence should be addressed to Zhiguang Feng; [email protected] Received 11 September 2013; Accepted 8 October 2013

Academic Editor: Baoyong Zhang

Copyright © 2013 Chengming Yang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

The problem of robust𝑙2-𝑙filtering for discrete-time system with interval time-varying delay and uncertainty is investigated, where the time delay and uncertainty considered are varying in a given interval and norm-bounded, respectively. The filtering problem based on the𝑙2-𝑙performance is to design a filter such that the filtering error system is asymptotically stable with minimizing the peak value of the estimation error for all possible bounded energy disturbances. Firstly, sufficient𝑙2-𝑙performance analysis condition is established in terms of linear matrix inequalities (LMIs) for discrete-time delay systems by utilizing reciprocally convex approach. Then a less conservative result is obtained by introducing some variables to decouple the Lyapunov matrices and the filtering error system matrices. Moreover, the robust𝑙2-𝑙filter is designed for systems with time-varying delay and uncertainty.

Finally, a numerical example is given to demonstrate the effectiveness of the filter design method.

1. Introduction

The uncertainty is unavoidable in practical engineering due to the parameter drafting, modeling error, and component aging. The controllers or filtering obtained based on nominal systems cannot be employed to get the desired performance.

Therefore, more and more researchers are devoted to robust control or robust filtering problems; see, for instance, [1–4].

On the other hand, time-delay often exists in the practical engineering systems and is the main reason of the instability and poor performance of the systems. Time-delay systems have been widely studied during the past two decades [5–7].

In order to get less conservative results, more and more approaches have been proposed to develop delay-dependent conditions for discrete-time system with time-varying delay.

For examples, Jensen’s inequality is proposed in [8]; delay- partitioning method is utilized in [9]; improved results are obtained by using convex combination approach in [10].

In some practical applications, the peak value of the esti- mation error is required to be within a certain range and

the aim of the𝑙2-𝑙(energy-to-peak) filtering is to minimize the peak values of the filtering error for any bounded energy disturbance, which has received many attention. By using a parameter-dependent approach, the robust energy- to-peak filtering problem is considered in [11]. An improved robust energy-to-peak filtering condition is proposed by increasing the flexible dimensions in the solution space in [12]. The robust𝐿2-𝐿filtering for stochastic systems and the exponential 𝐿2-𝐿 filtering for Markovian jump sys- tems are investigated in [13, 14], respectively. Compared with the corresponding continuous-time systems, discrete- time systems with time-varying delay have more stronger application background [15]. For discrete-time Markovian jumping systems, the reduced-order filter is designed in [16]

such that the filtering error system satisfies an energy-to-peak performance. When time-delay appears, the robust energy- to-peak filtering problem for networked systems is tackled in [17]. For discrete-time switched systems with time-varying delay, an improved robust energy-to-peak filtering design method is proposed in [18].

(3)

In this paper we consider the problem of robust𝑙2-𝑙fil- tering for uncertain discrete-time systems with time-varying delay. The filter is designed by employing the reciprocally convex approach proposed in [19] such that the filtering error system is asymptotically stable with an 𝑙2-𝑙 performance.

Firstly, a sufficient condition of the𝑙2-𝑙performance anal- ysis for nominal systems is obtained in terms of LMIs for systems with time-varying delay and uncertainty. Based on this criterion, by introducing some slack matrices, a less con- servative result is obtained. Moreover, the desired filter for nominal systems with time-varying delay is obtained by solv- ing a set of LMIs. Then the result is extended to the uncertain systems. A numerical example is given to illustrate the effectiveness of the presented results.

Notation. The notation used throughout the paper is given as follows. R𝑛 is the 𝑛-dimensional Euclidean space and 𝑃 > 0 (≥0) denotes that matrix 𝑃 is real symmetric and positive definite (semidefinite); 𝐼 and 0 present the iden- tity matrix and zero matrix with compatible dimensions, respectively;⋆means the symmetric terms in a symmetric matrix and sym(𝐴)stands for 𝐴 + 𝐴𝑇; 𝑙2 means the space of square summable infinite vector sequences; for any real function 𝑥 ∈ 𝑙2, we define‖𝑥‖ = sup𝑘√𝑥𝑇(𝑘)𝑥(𝑘) and

‖𝑥‖2 = √∑𝑘=0𝑥𝑇(𝑘)𝑥(𝑘);‖ ⋅ ‖refer to the Euclidean vector norm. Matrices are assumed to be compatible for algebraic operations if their dimensions are not explicitly stated.

2. Problem Statement

Consider a class of uncertain discrete-time systems with time-varying delay described by

𝑥 (𝑘 + 1) = 𝐴 (𝜎) 𝑥 (𝑘) + 𝐴𝑑(𝜎) 𝑥 (𝑘 − 𝑑 (𝑘)) + 𝐵 (𝜎) 𝑤 (𝑘) , 𝑦 (𝑘) = 𝐶 (𝜎) 𝑥 (𝑘) + 𝐶𝑑(𝜎) 𝑥 (𝑘 − 𝑑 (𝑘)) + 𝐷 (𝜎) 𝑤 (𝑘) ,

𝑧 (𝑘) = 𝐿 (𝜎) 𝑥 (𝑘) + 𝐿𝑑(𝜎) 𝑥 (𝑘 − 𝑑 (𝑘)) + 𝐺 (𝜎) 𝑤 (𝑘) , 𝑥 (𝑘) = 𝜙 (𝑘) , 𝑘 = −𝑑2, −𝑑2+ 1, . . . , 0,

(1) where 𝑥(𝑘) ∈ R𝑛 is the state vector; 𝑦(𝑘) ∈ R𝑚 is the measured output; 𝑧(𝑘) ∈ R𝑝 represents the signal to be estimated;𝑤(𝑘) ∈ R𝑙 is assumed to be an arbitrary noise belonging to𝑙2and𝜙(𝑘)is a given initial condition sequence;

𝑑(𝑘)is a time-varying delay satisfying

1 ≤ 𝑑1≤ 𝑑 (𝑘) ≤ 𝑑2< ∞, 𝑘 = 1, 2, . . . (2) 𝐴(𝜎),𝐴𝑑(𝜎),𝐵(𝜎),𝐶(𝜎),𝐶𝑑(𝜎),𝐷(𝜎),𝐿(𝜎),𝐿𝑑(𝜎), and𝐺(𝜎) are system matrices and satisfy

𝐴 (𝜎) = 𝐴 + Δ𝐴 (𝜎) , 𝐴𝑑(𝜎) = 𝐴𝑑+ Δ𝐴𝑑(𝜎) , 𝐵 (𝜎) = 𝐵 + Δ𝐵 (𝜎) ,

𝐶 (𝜎) = 𝐶 + Δ𝐶 (𝜎) , 𝐶𝑑(𝜎) = 𝐶𝑑+ Δ𝐶𝑑(𝜎) , 𝐷 (𝜎) = 𝐷 + Δ𝐷 (𝜎) ,

𝐿 (𝜎) = 𝐿 + Δ𝐿 (𝜎) , 𝐿𝑑(𝜎) = 𝐿𝑑+ Δ𝐿𝑑(𝜎) , 𝐺 (𝜎) = 𝐺 + Δ𝐺 (𝜎) .

(3) Matrices Δ𝐴(𝜎), Δ𝐴𝑑(𝜎), Δ𝐵(𝜎), Δ𝐶(𝜎), Δ𝐶𝑑(𝜎), Δ𝐷(𝜎), Δ𝐿(𝜎), Δ𝐿𝑑(𝜎), and Δ𝐺(𝜎) are unknown time-invariant matrix representing the uncertainty of the system satisfying the following conditions:

[Δ𝐴 (𝜎) Δ𝐴𝑑(𝜎) Δ𝐵 (𝜎)] = 𝑀1Δ1(𝜎) [𝑁𝐴 𝑁𝐴𝑑 𝑁𝐵] , Δ𝑇1(𝜎) Δ1(𝜎) ≤ 𝐼, [Δ𝐶 (𝜎) Δ𝐶𝑑(𝜎) Δ𝐷 (𝜎)] = 𝑀2Δ2(𝜎) [𝑁𝐶 𝑁𝐶𝑑 𝑁𝐷] , Δ𝑇2(𝜎) Δ2(𝜎) ≤ 𝐼, [Δ𝐿 (𝜎) Δ𝐿𝑑(𝜎) Δ𝐺 (𝜎)] = 𝑀3Δ3(𝜎) [𝑁𝐿 𝑁𝐿𝑑 𝑁𝐺] ,

Δ𝑇3(𝜎) Δ3(𝜎) ≤ 𝐼, (4) where𝜎 ∈ ΘandΘis a compact set inR. The system in (1) is assumed to be asymptotically stable. Our purpose is to design a full order linear filter for the estimate of𝑧(𝑘):

̂𝑥 (𝑘 + 1) = 𝐴𝑓̂𝑥 (𝑘) + 𝐵𝑓𝑦 (𝑘) , ̂𝑥 (0) = 0,

̂𝑧 (𝑘) = 𝐶𝑓̂𝑥 (𝑘) + 𝐷𝑓𝑦 (𝑘) , (5) where𝐴𝑓,𝐵𝑓,𝐶𝑓, and𝐷𝑓are filter gains to be determined.

Let the augmented state vector ̃𝑥(𝑘) = [𝑥𝑇(𝑘) ̂𝑥𝑇(𝑘)]𝑇 and ̃𝑧(𝑘) = 𝑧(𝑘) − ̂𝑧(𝑘). Then the filtering error system is described as

̃𝑥 (𝑘 + 1) = ̃𝐴 (𝜎) ̃𝑥 (𝑘) + ̃𝐴𝑑(𝜎) Φ̃𝑥 (𝑘 − 𝑑 (𝑘)) + ̃𝐵 (𝜎) 𝑤 (𝑘)

̃𝑧 (𝑘) = ̃𝐿 (𝜎) ̃𝑥 (𝑘) + ̃𝐿𝑑(𝜎) Φ̃𝑥 (𝑘 − 𝑑 (𝑘)) + ̃𝐺 (𝜎) 𝑤 (𝑘)

̃𝑥 (𝑘) = [𝜙𝑇 (𝑘) 0]𝑇, 𝑘 = −𝑑2, −𝑑2+ 1, . . . , 0, (6) whereΦ = [𝐼 0]and

𝐴 (𝜎) = [ 𝐴 (𝜎)̃ 0

𝐵𝑓𝐶 (𝜎) 𝐴𝑓] , 𝐴̃𝑑(𝜎) = [ 𝐴𝑑(𝜎) 𝐵𝑓𝐶𝑑(𝜎)] ,

̃𝐵 = [ 𝐵 (𝜎)𝐵𝑓𝐷 (𝜎)] ,

̃𝐿 (𝑘) = [𝐿 (𝜎) − 𝐷𝑓𝐶 (𝜎) −𝐶𝑓] ,

̃𝐿𝑑(𝜎) = 𝐿𝑑(𝜎) − 𝐷𝑓𝐶𝑑(𝜎) , 𝐺 (𝜎) = 𝐺 (𝜎) − 𝐷̃ 𝑓𝐷 (𝜎) . (7)

(4)

The nominal system of (6) is system (6) without uncer- tainty; that is,Δ𝐴(𝜎) = 0,Δ𝐴𝑑(𝜎) = 0,Δ𝐵(𝜎) = 0,Δ𝐶(𝜎) = 0,Δ𝐶𝑑(𝜎) = 0,Δ𝐷(𝜎) = 0,Δ𝐿(𝜎) = 0,Δ𝐿𝑑(𝜎) = 0, and Δ𝐺(𝜎) = 0.

The following lemmas and definition will be utilized in the derivation of the main results.

Lemma 1 (see [20]). For any matrices 𝑈 and𝑉 > 0, the following inequality holds:

𝑈𝑉−1𝑈𝑇≥ 𝑈 + 𝑈𝑇− 𝑉. (8) Lemma 2 (see [19]). Let𝑓1, 𝑓2, . . . , 𝑓𝑁:R𝑚 → Rhave pos- itive values in a subset𝐷ofR𝑚. Then, the reciprocally convex combination of𝑓𝑖over𝐷satisfies

{𝛼𝑖|𝛼𝑖>0,∑min𝑖𝛼𝑖=1}

𝑖

1

𝛼𝑖𝑓𝑖(𝑘) = ∑

𝑖

𝑓𝑖(𝑘) +max

𝑔𝑖,𝑗(𝑘)

𝑖 ̸= 𝑗

𝑔𝑖,𝑗(𝑘) (9) subject to

{𝑔𝑖,𝑗:R𝑚 󳨀→ R, 𝑔𝑗,𝑖(𝑘) = 𝑔𝑖,𝑗(𝑘) , [𝑓𝑖(𝑘) 𝑔𝑖,𝑗(𝑘) 𝑔𝑗,𝑖(𝑘) 𝑓𝑗(𝑘) ] ≥ 0} .

(10) Lemma 3. For any constant matrix𝑀 > 0, integers𝑎 ≤ 𝑏, vector function𝑤:{𝑎, 𝑎 + 1, . . . , 𝑏} → R𝑛, then

− (𝑏 − 𝑎 + 1)∑𝑏

𝑖=𝑎

𝑤𝑇(𝑖) 𝑀𝑤 (𝑖) ≤ −(∑𝑏

𝑖=𝑎

𝑤(𝑖))

𝑇

𝑀 (∑𝑏

𝑖=𝑎𝑤 (𝑖)) . (11) Lemma 4. Given a symmetric matrix𝑄and matrices𝐻,𝐸 with appropriate dimensions, then

𝑄 + sym(𝐻𝐹𝐸) < 0, (12) for all𝐹𝑇𝐹 ≤ 𝐼, if and only if there exists a scalar𝜀 > 0such that

𝑄 + 𝜀𝐸𝑇𝐸 + 𝜀−1𝐻𝐻𝑇< 0. (13) Definition 5. Given a scalar𝛾 > 0, the filtering error̃𝑧(𝑘)in (6) is said to satisfy the𝑙2-𝑙disturbance attenuation level𝛾 under zero initial state, and the following condition is sat- isfied:

‖̃𝑧‖< 𝛾‖𝑤‖2. (14) Our aim is to design a filter in the form of (5) such that the filtering error system in (6) is asymptotically stable and satisfies the𝑙2-𝑙performance defined inDefinition 5.

3. Main Results

In this section, the sufficient 𝑙2-𝑙 performance analysis condition is first derived for nominal filtering error system of (6). Then an equivalent result is obtained by introducing three slack matrices. Based on these results, a desired filter is designed to render the nominal system of (6) asymptotically stable with an𝑙2-𝑙performance. Then the result is extended to the uncertain system in (6).

3.1.𝑙2-𝑙 Performance Analysis. In this subsection, we first give the result of 𝑙2-𝑙 performance analysis for nominal system of (6).

Theorem 6. Given a scalar𝛾 > 0, the nominal system of (6) is asymptotically stable with an𝑙2-𝑙performance if there exist matrices𝑃 > 0, 𝑄3 > 0, 𝑄𝑖> 0, 𝑖 = 1, 2,𝑆𝑗> 0, 𝑗 = 1, 2, and𝑀such that the following LMIs hold:

[𝑆2 𝑀

⋆ 𝑆2] ≥ 0, (15)

[[ [[ [ [

𝑃 0 0 ̃𝐿𝑇

⋆ 𝑄3 0 ̃𝐿𝑇𝑑

⋆ ⋆ 𝐼 ̃𝐺𝑇

⋆ ⋆ ⋆ 𝛾2𝐼 ]] ]] ] ]

> 0, (16)

Π =̃ [[ [[ [[ [[ [[ [[ [

Π̃11 Φ𝑇𝑆1 0 0 0 ̃Π16𝑆1 ̃Π17𝑆2 𝐴̃𝑇𝑃

⋆ Π̃22 Π̃23 𝑀𝑇 0 0 0 0

⋆ ⋆ Π̃33 Π̃34 0 𝑑1𝐴𝑇𝑑𝑆1 𝑑𝐴̃ 𝑇𝑑𝑆2 𝐴̃𝑇𝑑𝑃

⋆ ⋆ ⋆ ̃Π44 0 0 0 0

⋆ ⋆ ⋆ ⋆ −𝐼 𝑑1𝐵𝑇𝑆1 𝑑𝐵̃ 𝑇𝑆2 ̃𝐵𝑇𝑃

⋆ ⋆ ⋆ ⋆ ⋆ −𝑆1 0 0

⋆ ⋆ ⋆ ⋆ ⋆ ⋆ −𝑆2 0

⋆ ⋆ ⋆ ⋆ ⋆ ⋆ ⋆ −𝑃

]] ]] ]] ]] ]] ]] ]

< 0,

(17) where

̃Π11= −𝑃 + 𝑄1+ 𝑄2+ ( ̃𝑑 + 1) Φ𝑇𝑄3Φ − Φ𝑇𝑆1Φ, Π̃22= −𝑆2− 𝑄1− 𝑆1, Π̃23= 𝑆2− 𝑀𝑇,

̃Π33= −𝑄3− 2𝑆2+ sym(𝑀) , Π̃34= 𝑆2− 𝑀𝑇, Π̃44= −𝑄2− 𝑆2,

Π̃16= 𝑑1Φ𝑇(𝐴 − 𝐼)𝑇, Π̃17= ̃𝑑Φ𝑇(𝐴 − 𝐼)𝑇, 𝑄𝑖=diag{𝑄𝑖, 𝑄𝑖} , 𝑖 = 1, 2, ̃𝑑 = 𝑑2− 𝑑1.

(18)

Proof. First, the asymptotic stability of the nominal system of (6) is proved. We denotẽ𝜂(𝑘) = ̃𝑥(𝑘 + 1) − ̃𝑥(𝑘)and the following Lyapunov functional is chosen:

𝑉 (𝑘) = 𝑉1(𝑘) + 𝑉2(𝑘) + 𝑉3(𝑘) + 𝑉4(𝑘) + 𝑉5(𝑘) , (19) where

𝑉1(𝑘) = ̃𝑥𝑇(𝑘) 𝑃̃𝑥 (𝑘) , 𝑉2(𝑘) =∑2

𝑗=1 𝑘−1

𝑖=𝑘−𝑑𝑗

̃𝑥𝑇(𝑖) 𝑄𝑖̃𝑥 (𝑖) ,

(5)

𝑉3(𝑘) = 𝑘−1

𝑖=𝑘−𝑑(𝑘)

̃𝑥𝑇(𝑖) Φ𝑇𝑄3Φ̃𝑥 (𝑖)

+ −𝑑1

𝑗=−𝑑2+1 𝑘−1

𝑖=𝑘+𝑗̃𝑥𝑇(𝑖) Φ𝑇𝑄3Φ̃𝑥 (𝑖) , 𝑉4(𝑘) = ∑−1

𝑗=−𝑑1

𝑘−1

𝑖=𝑘+𝑗

𝑑1̃𝜂𝑇(𝑖) Φ𝑇𝑆1Φ̃𝜂 (𝑖) ,

𝑉5(𝑘) =−𝑑1−1

𝑗=−𝑑2

𝑘−1

𝑖=𝑘+𝑗

𝑑̃𝜂̃ 𝑇(𝑖) Φ𝑇𝑆2Φ̃𝜂 (𝑖) .

(20) Calculating the forward difference of𝑉(𝑘)along the trajecto- ries of filtering error system (6) with𝑤(𝑘) = 0yields

Δ𝑉1(𝑘) = ̃𝑥𝑇(𝑘 + 1) 𝑃̃𝑥 (𝑘 + 1) − ̃𝑥𝑇(𝑘) 𝑃̃𝑥 (𝑘)

= ( ̃𝐴̃𝑥(𝑘) + ̃𝐴𝑑Φ̃𝑥(𝑘 − 𝑑(𝑘)))𝑇

× 𝑃 ( ̃𝐴̃𝑥 (𝑘) + ̃𝐴𝑑Φ̃𝑥 (𝑘 − 𝑑 (𝑘)))

− ̃𝑥𝑇(𝑘) 𝑃̃𝑥 (𝑘) ,

(21)

Δ𝑉2(𝑘) =∑2

𝑗=1

̃𝑥𝑇(𝑘) 𝑄𝑗̃𝑥 (𝑘)

−∑2

𝑗=1

̃𝑥 (𝑘 − 𝑑𝑗) 𝑄𝑗̃𝑥 (𝑘 − 𝑑𝑗)

≤∑2

𝑗=1̃𝑥𝑇(𝑘) 𝑄𝑗̃𝑥 (𝑘)

−∑2

𝑗=1̃𝑥 (𝑘 − 𝑑𝑗) Φ𝑇𝑄𝑗Φ̃𝑥 (𝑘 − 𝑑𝑗) ,

(22)

Δ𝑉3(𝑘) = ( ̃𝑑 + 1) ̃𝑥𝑇(𝑘) Φ𝑇𝑄3Φ̃𝑥 (𝑘)

+ 𝑘−1

𝑖=𝑘+1−𝑑(𝑘+1)

̃𝑥𝑇(𝑖) Φ𝑇𝑄3Φ̃𝑥 (𝑖)

𝑘−1

𝑖=𝑘+1−𝑑(𝑘)

̃𝑥𝑇(𝑖) Φ𝑇𝑄3Φ̃𝑥 (𝑖)

− ̃𝑥𝑇(𝑘 − 𝑑 (𝑘)) Φ𝑇𝑄3Φ̃𝑥 (𝑘 − 𝑑 (𝑘))

𝑘−𝑑1

𝑖=𝑘−𝑑2+1

̃𝑥𝑇(𝑖) Φ𝑇𝑄3Φ̃𝑥 (𝑖)

= ( ̃𝑑 + 1) ̃𝑥𝑇(𝑘) Φ𝑇𝑄3Φ̃𝑥 (𝑘) + 𝑘−1

𝑖=𝑘+1−𝑑1

̃𝑥𝑇(𝑖) Φ𝑇𝑄3Φ̃𝑥 (𝑖)

+ 𝑘−𝑑1

𝑖=𝑘+1−𝑑(𝑘+1)̃𝑥𝑇(𝑖) Φ𝑇𝑄3Φ̃𝑥 (𝑖)

− ̃𝑥𝑇(𝑘 − 𝑑 (𝑘)) Φ𝑇𝑄3Φ̃𝑥 (𝑘 − 𝑑 (𝑘))

𝑘−1

𝑖=𝑘+1−𝑑(𝑘)

̃𝑥𝑇(𝑖) Φ𝑇𝑄3Φ̃𝑥 (𝑖)

𝑘−𝑑1

𝑖=𝑘−𝑑2+1̃𝑥𝑇(𝑖) Φ𝑇𝑄3Φ̃𝑥 (𝑖)

≤ ( ̃𝑑 + 1) ̃𝑥𝑇(𝑘) Φ𝑇𝑄3Φ̃𝑥 (𝑘)

− ̃𝑥𝑇(𝑘 − 𝑑 (𝑘)) Φ𝑇𝑄3Φ̃𝑥 (𝑘 − 𝑑 (𝑘)) .

(23) By usingLemma 3, we have

Δ𝑉4(𝑘) = 𝑑21̃𝜂𝑇(𝑘) Φ𝑇𝑆1Φ̃𝜂 (𝑘)

− 𝑑1 𝑘−1

𝑖=𝑘−𝑑1̃𝜂𝑇(𝑖) Φ𝑇𝑆1Φ̃𝜂 (𝑖)

≤ 𝑑21((𝐴 − 𝐼) Φ̃𝑥 (𝑘) + 𝐴𝑑Φ̃𝑥 (𝑘 − 𝑑 (𝑘)))𝑇

× 𝑆1((𝐴 − 𝐼) Φ̃𝑥 (𝑘) + 𝐴𝑑Φ̃𝑥 (𝑘 − 𝑑 (𝑘)))

− (Φ̃𝑥 (𝑘) − Φ̃𝑥 (𝑘 − 𝑑1))𝑇

× 𝑆1(Φ̃𝑥 (𝑘) − Φ̃𝑥 (𝑘 − 𝑑1)) .

(24)

Since[𝑆⋆ 𝑆2𝑀2] ≥ 0, the following inequality holds:

[[ [[ [

√𝛼1

𝛼2(𝑥 (𝑘 − 𝑑 (𝑘)) − 𝑥 (𝑘 − 𝑑2))

−√𝛼2

𝛼1(𝑥 (𝑘 − 𝑑1) − 𝑥 (𝑘 − 𝑑 (𝑘))) ]] ]] ]

𝑇

× [𝑆2 𝑀

⋆ 𝑆2]

×[[[[ [

√𝛼1

𝛼2(𝑥 (𝑘 − 𝑑 (𝑘)) − 𝑥 (𝑘 − 𝑑2))

−√𝛼2

𝛼1 (𝑥 (𝑘 − 𝑑1) − 𝑥 (𝑘 − 𝑑 (𝑘))) ]] ]] ]

≥ 0,

(25)

(6)

where𝛼1 = (𝑑2 − 𝑑(𝑘))/ ̃𝑑and 𝛼2 = (𝑑(𝑘) − 𝑑1)/ ̃𝑑. Then employingLemma 2, for𝑑1< 𝑑(𝑘) < 𝑑2, we have

Δ𝑉5(𝑘) = ̃𝑑2̃𝜂𝑇(𝑘) Φ𝑇𝑆2Φ̃𝜂 (𝑘)

− ̃𝑑𝑘−𝑑(𝑘)−1

𝑖=𝑘−𝑑2

̃𝜂𝑇(𝑖) Φ𝑇𝑆2Φ̃𝜂 (𝑖)

− ̃𝑑𝑘−𝑑1−1

𝑖=𝑘−𝑑(𝑘)

̃𝜂𝑇(𝑖) Φ𝑇𝑆2Φ̃𝜂 (𝑖)

≤ ̃𝑑2̃𝜂𝑇(𝑘) Φ𝑇𝑆2Φ̃𝜂 (𝑘)

− 𝑑̃

𝑑2− 𝑑 (𝑘)(𝑘−𝑑(𝑘)−1

𝑖=𝑘−𝑑2

Φ̃𝜂(𝑖))

𝑇

𝑆2(𝑘−𝑑(𝑘)−1

𝑖=𝑘−𝑑2

Φ̃𝜂 (𝑖))

− 𝑑̃

𝑑 (𝑘) − 𝑑1(𝑘−𝑑1−1

𝑖=𝑘−𝑑(𝑘)

Φ̃𝜂(𝑖))

𝑇

𝑆2(𝑘−𝑑1−1

𝑖=𝑘−𝑑(𝑘)Φ̃𝜂 (𝑖))

≤ ̃𝑑2((𝐴 − 𝐼)Φ̃𝑥(𝑘) + 𝐴𝑑Φ̃𝑥(𝑘 − 𝑑(𝑘)))𝑇

× 𝑆2((𝐴 − 𝐼) Φ̃𝑥 (𝑘) + 𝐴𝑑Φ̃𝑥 (𝑘 − 𝑑 (𝑘)))

− [𝑥(𝑘 − 𝑑(𝑘)) − 𝑥(𝑘 − 𝑑2) 𝑥(𝑘 − 𝑑1) − 𝑥(𝑘 − 𝑑(𝑘))]

𝑇[𝑆2 𝑀

⋆ 𝑆2]

× [𝑥 (𝑘 − 𝑑 (𝑘)) − 𝑥 (𝑘 − 𝑑2) 𝑥 (𝑘 − 𝑑1) − 𝑥 (𝑘 − 𝑑 (𝑘))] .

(26) Note that when𝑑(𝑘) = 𝑑1or𝑑(𝑘) = 𝑑2, it yields𝑥(𝑘 − 𝑑1) − 𝑥(𝑘 − 𝑑(𝑘)) = 0or𝑥(𝑘 − 𝑑(𝑘)) − 𝑥(𝑘 − 𝑑2) = 0. Hence, the inequality in (24) still holds. Combining the conditions from (21) to (24), we have

Δ𝑉 (𝑘) = 𝜁𝑇(𝑘) Π𝑠𝜁 (𝑘) , (27)

where 𝜁 (𝑘)

= [̃𝑥𝑇(𝑘) ̃𝑥𝑇(𝑘 − 𝑑1) Φ𝑇 ̃𝑥𝑇(𝑘 − 𝑑 (𝑘)) Φ𝑇 ̃𝑥𝑇(𝑘 − 𝑑2) Φ𝑇]𝑇,

Π𝑠=[[[ [

̃Π11 Φ𝑇𝑆1 0 0

⋆ Π̃22 Π̃23 𝑀𝑇

⋆ ⋆ Π̃33 Π̃34

⋆ ⋆ ⋆ ̃Π44 ]] ] ]

+[[[ [

̃Π16 0 𝑑1𝐴𝑇𝑑

0 ]] ] ]

𝑆1[[[ [

Π̃16 0 𝑑1𝐴𝑇𝑑

0 ]] ] ]

𝑇

+[[[ [

Π̃17

̃0 𝑑𝐴𝑇𝑑

0 ]] ] ]

𝑆2[[[ [

̃Π17

̃0 𝑑𝐴𝑇𝑑

0 ]] ] ]

𝑇

+[[[ [

𝐴̃𝑇

̃0 𝐴𝑇𝑑

0 ]] ] ]

𝑃[[[ [

𝐴̃𝑇

̃0 𝐴𝑇𝑑

0 ]] ] ]

𝑇

.

(28)

On the other hand, the following inequality can be obtained from (17):

Π𝑠1= [[ [[ [[ [[ [ [

Π̃11 Φ𝑇𝑆1 0 0 ̃Π16𝑆1 Π̃17𝑆2 𝐴̃𝑇𝑃

⋆ ̃Π22 Π̃23 𝑀𝑇 0 0 0

⋆ ⋆ Π̃33 ̃Π34 𝑑1𝐴𝑇𝑑𝑆1 𝑑𝐴̃ 𝑇𝑑𝑆2 𝐴̃𝑇𝑑𝑃

⋆ ⋆ ⋆ ̃Π44 0 0 0

⋆ ⋆ ⋆ ⋆ −𝑆1 0 0

⋆ ⋆ ⋆ ⋆ ⋆ −𝑆2 0

⋆ ⋆ ⋆ ⋆ ⋆ ⋆ −𝑃

]] ]] ]] ]] ] ]

< 0

(29) which is equivalent toΠ𝑠 < 0. Hence,Δ𝑉(𝑘) < 0 which implies that the filtering error system in (6) with𝑤(𝑘) = 0 is asymptotically stable.

Next, we show the𝑙2-𝑙 performance of system (6). To this end, we define

𝐽 (𝑘) = 𝑉 (𝑘) −𝑘−1

𝑖=0𝑤𝑇(𝑖) 𝑤 (𝑖) . (30) Then under the zero initial condition, that is, 𝑥(𝑘) = 0, 𝑘 = −𝑑2, −𝑑2+ 1, . . . , 0, it can be shown that for any nonzero 𝑤(𝑘) ∈ 𝑙2[0, ∞)

𝐽 (𝑘) =𝑘−1

𝑖=0[Δ𝑉 (𝑖) − 𝑤𝑇(𝑖) 𝑤 (𝑖)]

=𝑘−1

𝑖=0

𝜉𝑇(𝑖) (Π + Π𝑇1𝑃Π1+ 𝑑12Π𝑇2𝑆1Π2 +𝑑212Π𝑇2𝑆2Π2) 𝜉 (𝑖) ,

(31)

where 𝜉 (𝑖)

= [̃𝑥𝑇(𝑖) ̃𝑥𝑇(𝑖 − 𝑑1) Φ𝑇 ̃𝑥𝑇(𝑖 − 𝑑 (𝑖)) Φ𝑇 ̃𝑥𝑇(𝑖 − 𝑑2) Φ𝑇 𝑤 (𝑖)]𝑇,

Π = [[ [[ [[ [

̃Π11 Φ𝑇𝑆1 0 0 Π̃15

⋆ Π̃22 Π̃23 𝑀𝑇 0

⋆ ⋆ Π̃33 Π̃34 −̃𝐿𝑇𝑑𝑆

⋆ ⋆ ⋆ ̃Π44 0

⋆ ⋆ ⋆ ⋆ Π̃55

]] ]] ]] ] ,

Π1= [ ̃𝐴 0 ̃𝐴𝑑 0 ̃𝐵] , Π2= [(𝐴 − 𝐼) Φ 0 𝐴𝑑 0 𝐵] ,

Π3= [̃𝐿 0 ̃𝐿𝑑 0 ̃𝐺] .

(32) By using Schur complement equivalence, the inequality in (17) is equivalent toΠ+Π𝑇1𝑃Π1+𝑑12Π𝑇2𝑆1Π2+𝑑212Π𝑇2𝑆2Π2< 0.

Then we have𝐽(𝑘) < 0; that is, 𝑉 (𝑘) <𝑘−1

𝑖=0

𝑤𝑇(𝑖) 𝑤 (𝑖) . (33)

(7)

On the other hand, it yields from (16) and (33) that

̃𝑧𝑇(𝑘) ̃𝑧 (𝑘) = 𝜂𝑇(𝑘) [̃𝐿 ̃𝐿𝑑 𝐺]̃𝑇[̃𝐿 ̃𝐿𝑑 𝐺] 𝜂 (𝑘)̃

≤ 𝛾2𝜂𝑇(𝑘) [ [

𝑃 0 0

⋆ 𝑄3 0

⋆ ⋆ 𝐼 ] ]

𝜂 (𝑘)

≤ 𝛾2(𝑉 (𝑘) + 𝑤𝑇(𝑘) 𝑤 (𝑘))

≤ 𝛾2𝑘

𝑖=0

𝑤𝑇(𝑖) 𝑤 (𝑖) ≤ 𝛾2

𝑖=0

𝑤𝑇(𝑖) 𝑤 (𝑖) , (34)

where

𝜂 (𝑘) = [ [

̃𝑥 (𝑘) Φ̃𝑥 (𝑘 − 𝑑 (𝑘))

𝑤 (𝑘) ] ]

. (35)

Then, we have‖̃𝑧‖ < 𝛾‖𝑤‖2by taking the supremum over time𝑘 > 0. ByDefinition 5, the filtering error̃𝑧(𝑘)satisfies a given𝑙2-𝑙disturbance attenuation level. This completes the proof.

Remark 7. The advantage of the results benefits from utilizing the reciprocally convex combination approach proposed in [19]. For the extensively used Jensen inequality [8], the inte- gral term

𝑘−𝑑1−1

𝑖=𝑘−𝑑2

(𝑑2− 𝑑1) 𝜂𝑇(𝑖) 𝑆𝜂 (𝑖)

= −𝑘−𝑑(𝑘)−1

𝑖=𝑘−𝑑2

(𝑑2− 𝑑1) 𝜂𝑇(𝑖) 𝑆𝜂 (𝑖)

𝑘−𝑑1−1

𝑖=𝑘−𝑑(𝑘)

(𝑑2− 𝑑1) 𝜂𝑇(𝑖) 𝑆𝜂 (𝑖)

(36)

with𝑑1≤ 𝑑(𝑘) ≤ 𝑑2, 𝜂(𝑖) = 𝑥(𝑖 + 1) − 𝑥(𝑖)by the term

− [𝑥(𝑘 − 𝑑1) − 𝑥(𝑘 − 𝑑(𝑘))]𝑇𝑆 [𝑥 (𝑘 − 𝑑1) − 𝑥 (𝑘 − 𝑑 (𝑘))]

− [𝑥(𝑘 − 𝑑(𝑘)) − 𝑥(𝑘 − 𝑑2)]𝑇𝑆 [𝑥 (𝑘 − 𝑑 (𝑘)) − 𝑥 (𝑘 − 𝑑2)]

(37)

which is a special case of the following term with𝑀 = 0

− [𝑥(𝑘 − 𝑑(𝑘)) − 𝑥(𝑘 − 𝑑1) 𝑥(𝑘 − 𝑑(𝑘)) − 𝑥(𝑘 − 𝑑2)]

𝑇

× [𝑆 𝑀⋆ 𝑆 ] [𝑥 (𝑘 − 𝑑 (𝑘)) − 𝑥 (𝑘 − 𝑑1) 𝑥 (𝑘 − 𝑑 (𝑡)) − 𝑥 (𝑘 − 𝑑2)]

(38)

with[⋆ 𝑆𝑆 𝑀] ≥ 0, which is one of the advantages of recip- rocally convex combination approach. On the other hand, the delay partitioning method is widely applied to reduce the conservatism of the results [9,21,22]. Also, the method can be extended to the problem considered in this paper.

However, it will rise significant computation cost with the partitioning number increasing. Therefore, the reciprocally convex method needs less decision variables and can be seen as a tradeoff between the conservatism and the computation cost.

Then, an equivalent condition of LMI (17) is obtained by introducing three slack matrices𝐻1,𝐻2, and𝑇, which is presented in the following theorem.

Theorem 8. Given a scalar𝛾 > 0, the nominal system of (6) is asymptotically stable with an𝑙2-𝑙performance if there exist matrices𝑃 > 0, 𝑄𝑖 > 0,𝑖 = 1, 2, 3,𝑆𝑗 > 0,𝐻𝑗,𝑗 = 1, 2,𝑇, and𝑀, such that the following LMIs hold:

[𝑆2 𝑀

⋆ 𝑆2] ≥ 0, (39)

[[ [[ [ [

𝑃 0 0 ̃𝐿𝑇

⋆ 𝑄3 0 ̃𝐿𝑇𝑑

⋆ ⋆ 𝐼 ̃𝐺𝑇

⋆ ⋆ ⋆ 𝛾2𝐼 ]] ]] ] ]

> 0, (40)

Ω =̃ [[ [[ [[ [[ [[ [[ [

Π̃11 Φ𝑇𝑆1 0 0 0 Π̃16𝐻1𝑇 ̃Π17𝐻2𝑇 𝐴̃𝑇𝑇𝑇

⋆ ̃Π22 ̃Π23 𝑀𝑇 0 0 0 0

⋆ ⋆ ̃Π33 ̃Π34 0 𝑑1𝐴𝑇𝑑𝐻1𝑇 𝑑𝐴̃ 𝑇𝑑𝐻2𝑇 𝐴̃𝑇𝑑𝑇𝑇

⋆ ⋆ ⋆ ̃Π44 0 0 0 0

⋆ ⋆ ⋆ ⋆ −𝐼 𝑑1𝐵𝑇𝐻1𝑇 𝑑𝐵̃ 𝑇𝐻𝑇2 ̃𝐵𝑇𝑇𝑇

⋆ ⋆ ⋆ ⋆ ⋆ 𝑆1− 𝐻1𝑇− 𝐻1 0 0

⋆ ⋆ ⋆ ⋆ ⋆ ⋆ 𝑆2− 𝐻2𝑇− 𝐻2 0

⋆ ⋆ ⋆ ⋆ ⋆ ⋆ ⋆ 𝑃 − 𝑇𝑇− 𝑇

]] ]] ]] ]] ]] ]] ]

< 0 , (41)

(8)

whereΠ̃𝑖𝑖,𝑖 = 1, . . . , 4,̃Π16,Π̃17,̃Π23, and̃Π34are defined in (17).

Proof. On one hand, if (17) holds, then there exist𝐻𝑗= 𝐻𝑗𝑇= 𝑆𝑗, 𝑗 = 1, 2, and𝑇 = 𝑇𝑇 = 𝑃such that (41) holds. On the other hand, if (41) holds, we have the following inequality based onLemma 1:

[[ [[ [[ [[ [

Π̃11 Φ𝑇𝑆1 0 0 0 Π̃16𝐻1𝑇 Π̃17𝐻2𝑇 𝐴̃𝑇𝑇𝑇

̃Π22 ̃Π23 𝑀𝑇 0 0 0 0

̃Π33 Π̃34 0 𝑑1𝐴𝑇𝑑𝐻1𝑇 𝑑𝐴̃ 𝑇𝑑𝐻2𝑇 𝐴̃𝑇𝑑𝑇𝑇

⋆ ̃Π44 0 0 0 0

⋆ −𝐼 𝑑1𝐵𝑇𝐻𝑇1 𝑑𝐵̃𝑇𝐻2𝑇 ̃𝐵𝑇𝑇𝑇

⋆ −𝐻1𝑆−11 𝐻1𝑇 0 0

−𝐻2𝑆−12 𝐻2𝑇 0

−𝑇𝑃−1𝑇𝑇

]] ]] ]] ]] ]

< 0.

(42)

In addition, matrices𝐻𝑗,𝑗 = 1, 2, and𝑇are nonsingular due to𝑆𝑗−𝐻𝑗𝑇−𝐻𝑗 < 0,𝑗 = 1, 2, and𝑃−𝑇𝑇−𝑇 < 0. Then, pre- and promultiplying (42) by diag{𝐼, 𝐼, 𝐼, 𝐼, 𝐼, 𝑆1𝐻1−1, 𝑆2𝐻2−1, 𝑃𝑇−1} and its transpose yields (17). Therefore, the equivalence between (41) and (17) is proved.

3.2. Robust Filter Design. In this subsection, the filter in the form of (5) is firstly designed such that the nominal filtering error system of (6) is asymptotically stable with an 𝑙2-𝑙 performance. Then the robust filtering problem is solved.

Based on the result ofTheorem 8, the filter design method for nominal system of (1) is presented in the following theorem.

Theorem 9. Given a scalar𝛾 > 0, the nominal system of (6) is asymptotically stable with an𝑙2-𝑙performance if there exist matrices[𝑃⋆ 𝑃1𝑃23] > 0,𝑄3 > 0,𝑄̃𝑙 > 0,𝑄𝑙> 0,𝑙 = 1, 2,𝑆𝑗 > 0, 𝐻𝑗,𝐹𝑗,𝑗 = 1, 2, diagonal matrix𝑁 > 0,𝑇1, and𝑀such that the following set of LMIs hold:

[𝑆2 𝑀

⋆ 𝑆2] ≥ 0 (43)

Ω = [Ξ Γ⋆ Λ] < 0 (44)

Υ = [[ [[ [[ [[ [[ [

𝑃1 𝑃2 0 0 (𝐿 − 𝐷𝑓𝐶)𝑇

⋆ 𝑃3 0 0 −𝐶𝑇𝑓

⋆ ⋆ 𝑄3 0 (𝐿𝑑− 𝐷𝑓𝐶𝑑)𝑇

⋆ ⋆ ⋆ 𝐼 (𝐺 − 𝐷𝑓𝐶𝑑)𝑇

⋆ ⋆ ⋆ ⋆ 𝛾2𝐼 ]] ]] ]] ]] ]] ]

> 0, (45)

where

Ξ = [[ [[ [[ [ [

Ξ11 −𝑃2 𝑆1 𝐶𝑇𝑁𝐶𝑑 0 0

⋆ Ξ22 0 0 0 0

⋆ ⋆ Ξ33 𝑆2− 𝑀𝑇 𝑀𝑇 0

⋆ ⋆ ⋆ Ξ44 𝑆2− 𝑀𝑇 0

⋆ ⋆ ⋆ ⋆ Ξ55 0

⋆ ⋆ ⋆ ⋆ ⋆ −𝐼

]] ]] ]] ] ] ,

Γ=

[[ [[ [[ [[ [[ [ [

Γ11 Γ12 𝐴𝑇𝑇1𝑇+ 𝐶𝑇A𝑠0𝐵𝑇𝑓 𝐴𝑇𝐹1𝑇+ 𝐶𝑇A𝑠0𝐵𝑇𝑓

0 0 𝐴𝑇𝑓 𝐴𝑇𝑓

0 0 0 0

𝑑1𝐴𝑇𝑑𝐻1𝑇 𝑑𝐴̃ 𝑇𝑑𝐻𝑇2 𝐴𝑇𝑑𝑇1𝑇+ 𝐶𝑇𝑑A𝑠0𝐵𝑇𝑓 𝐴𝑇𝑑𝐹1𝑇+ 𝐶𝑇𝑑𝑖A𝑠0𝐵𝑇𝑓

0 0 0 0

𝑑1𝐵𝑇𝐻1𝑇 𝑑𝐵̃ 𝑇𝐻2𝑇 𝐵𝑇𝑇1𝑇+ 𝐷𝑇A𝑠0𝐵𝑇𝑓 𝐵𝑇𝐹1𝑇+ 𝐷𝑇A𝑠0𝐵𝑇𝑓 ]] ]] ]] ]] ]] ] ]

,

Λ=[[[ [

𝑆1− 𝐻1− 𝐻1𝑇 0 0 0

𝑆2− 𝐻2− 𝐻𝑇2 0 0

𝑃1− 𝑇1− 𝑇1𝑇 𝑃2− 𝐹2− 𝐹1𝑇

𝑃3− 𝐹2− 𝐹2𝑇

]] ] ] ,

Ξ11 = − (𝑃1+ 𝑆1) + 𝑄1+ 𝑄2+ ( ̃𝑑 + 1) 𝑄3, Ξ22= −𝑃3+ ̃𝑄1+ ̃𝑄2 ,

Ξ33= −𝑆2− 𝑄1− 𝑆1, Ξ44= −𝑄3+ sym(𝑀𝑖− 𝑆2𝑖) ,

Ξ55= −𝑄2− 𝑆2,

Γ11= 𝑑1(𝐴 − 𝐼)𝑇𝐻1𝑇, Γ12= ̃𝑑(𝐴 − 𝐼)𝑇𝐻2𝑇. (46) Moreover, a suitable𝑙2-𝑙filter is given by

𝐴𝑓= 𝐴𝑓𝐹2−1, 𝐵𝑓= 𝐵𝑓, 𝐶𝑓= 𝐶𝑓𝐹2−1,

𝐷𝑓= 𝐷𝑓. (47)

Proof. Firstly, we introduce four matrices𝑇1,𝑇2,𝑇3, and𝑇4 with𝑇4invertible and define

𝐽1= [𝐼 0

0 𝑇2𝑇4−1] , 𝐹1= 𝑇2𝑇4−1𝑇3, 𝐹2= 𝑇2𝑇4−𝑇𝑇2𝑇, 𝑄̃𝑙= 𝑇2𝑇4−1𝑄𝑙𝑇4−𝑇𝑇2𝑇, 𝐽 =diag{𝐽1, 𝐼, 𝐼, 𝐼, 𝐼, 𝐼, 𝐼, 𝐼, 𝐽1} ,

[𝑃1 𝑃2

⋆ 𝑃3] = 𝐽1𝑃𝐽1𝑇, 𝑇 = [𝑇1 𝑇2 𝑇3 𝑇4] , 𝐽2=diag{𝐽1, 𝐼, 𝐼, 𝐼} ,

[𝐴𝑓 𝐵𝑓

𝐶𝑓 𝐷𝑓] = [𝑇2 0

0 𝐼] [𝐴𝑓 𝐵𝑓

𝐶𝑓 𝐷𝑓] [𝑇4−𝑇𝑇2𝑇 0 0 𝐼] .

(48) From (44), we have𝐹2 + 𝐹2𝑇 = 𝑇2𝑇4−𝑇𝑇2𝑇+ 𝑇2𝑇4−1𝑇2𝑇 > 0 which implies that 𝑇2 is nonsingular. Hence, 𝐽and 𝐽2 are

(9)

nonsingular. The inequality in (45) can be obtained by pre- an promultiplying (33) with𝐽2 and𝐽2𝑇, respectively. Noting that

Ω = 𝐽̃Ω𝐽𝑇 (49)

we haveΩ < 0. On the other hand, becausẽ 𝑇2and𝑇4cannot be obtained from (44), we cannot determine the filters from (48). However, we can construct an equivalent filter transfer function from𝑦(𝑘)tõ𝑧(𝑘):

𝑇̃𝑧𝑦= 𝐶𝑓(𝑧𝐼 − 𝐴𝑓)−1𝐵𝑓+ 𝐷𝑓

= 𝐶𝑓𝑇2−𝑇𝑇4𝑇(𝑧𝐼 − 𝑇2−1𝐴𝑓𝑇2−𝑇𝑇4𝑇)−1𝑇2−1𝐵𝑓+ 𝐷𝑓

= 𝐶𝑓(𝑧𝐹2− 𝐴𝑓)−1𝐵𝑓+ 𝐷𝑓

= 𝐶𝑓𝐹2−1(𝑧𝐼 − 𝐴𝑓𝐹2−1)−1𝐵𝑓+ 𝐷𝑓.

(50)

Therefore, the desired filter can be obtained from (47). This completes the proof.

Then the filter design result for uncertain system (6) is presented in the following theorem.

Theorem 10. Given a scalar 𝛾 > 0, the system in(6) with uncertainty is asymptotically stable with an𝑙2-𝑙performance if there exist matrices [𝑃⋆ 𝑃1𝑃23] > 0, 𝑄3 > 0, 𝑄̃𝑙 > 0, 𝑄𝑙 > 0,𝑙 = 1, 2, 𝑆𝑗 > 0, 𝐻𝑗,𝐹𝑗,𝑗 = 1, 2, diagonal matrix 𝑁 > 0,𝑇1,𝑀, and scalars𝜀𝑖 > 0,𝑖 = 1, . . . , 4such that the following set of LMIs hold:

[𝑆2 𝑀

⋆ 𝑆2] ≥ 0, (51)

[ [

Ω + 𝜀3Ω𝑇1Ω1+ 𝜀4Ω𝑇2Ω2 Ω3 Ω4

⋆ −𝜀3𝐼 0

⋆ ⋆ −𝜀4𝐼

] ]

< 0, (52)

[[ [[ [[ [[ [[ [[ [[ [ [

Υ11 𝑃2 Υ13 Υ14 (𝐿 − 𝐷𝑓𝐶)𝑇 0 0

⋆ 𝑃3 0 0 −𝐶𝑇𝑓 0 0

⋆ ⋆ Υ33 Υ34 (𝐿𝑑− 𝐷𝑓𝐶𝑑)𝑇 0 0

⋆ ⋆ ⋆ Υ44 (𝐺 − 𝐷𝑓𝐶𝑑)𝑇 0 0

⋆ ⋆ ⋆ ⋆ 𝛾2𝐼 𝑀3 0

⋆ ⋆ ⋆ ⋆ ⋆ 𝜀1𝐼 𝐷𝑓𝑀2

⋆ ⋆ ⋆ ⋆ ⋆ ⋆ 𝜀2𝐼

]] ]] ]] ]] ]] ]] ]] ] ]

> 0,

(53) whereΩis defined in(44)and

Ω1= [𝑁𝐴 0 0 𝑁𝐴𝑑 0 𝑁𝐵 0 0 0 0] ,

Ω2= [𝑁𝐶 0 0 𝑁𝐶𝑑 0 𝑁𝐷 0 0 0 0] , Ω3

= [0 0 0 0 0 0 𝑑1𝑀1𝑇𝐻1𝑇 𝑑𝑀̃ 𝑇1𝐻2𝑇 𝑀1𝑇𝑇1𝑇 𝑀1𝑇𝐹1𝑇]𝑇, Ω4= [0 0 0 0 0 0 0 0 𝑀2𝑇̃𝐵𝑇𝑓 𝑀2𝑇̃𝐵𝑇𝑓]𝑇,

Υ11= 𝑃1− 𝜀1𝑁𝐿𝑇𝑁𝐿− 𝜀2𝑁𝐶𝑇𝑁𝐶, Υ13= −𝜀1𝑁𝐿𝑇𝑁𝐿𝑑− 𝜀2𝑁𝐶𝑇𝑁𝐶𝑑,

Υ14= −𝜀1𝑁𝐿𝑇𝑁𝐺− 𝜀2𝑁𝐶𝑇𝑁𝐷, Υ33= 𝑄3− 𝜀1𝑁𝐿𝑑𝑇𝑁𝐿𝑑− 𝜀2𝑁𝐶𝑑𝑇𝑁𝐶𝑑,

Υ34= −𝜀1𝑁𝐿𝑑𝑇𝑁𝐺− 𝜀2𝑁𝐶𝑑𝑇 𝑁𝐷, Υ44= 𝐼 − 𝜀1𝑁𝐺𝑇𝑁𝐺− 𝜀2𝑁𝐷𝑇𝑁𝐷.

(54) Moreover, a suitable𝑙2-𝑙filter is given by

𝐴𝑓= 𝐴𝑓𝐹2−1, 𝐵𝑓= 𝐵𝑓, 𝐶𝑓= 𝐶𝑓𝐹2−1, 𝐷𝑓= 𝐷𝑓.

(55)

Proof. Firstly, replace matrices𝐴,𝐴𝑑,𝐵,𝐶,𝐶𝑑, and𝐷in (44) with𝐴+Δ𝐴,𝐴𝑑+Δ𝐴𝑑,𝐵+Δ𝐵, 𝐶+Δ𝐶,𝐶𝑑+Δ𝐶𝑑, and𝐷+Δ𝐷, respectively, and the following inequality is obtained:

Ω +sym(Ω𝑇1Δ𝑇1Ω𝑇3) +sym(Ω𝑇2Δ𝑇2Ω𝑇4) < 0, (56) where Ω𝑖, 𝑖 = 1, . . . , 4are defined in (52). Then by using Lemma 4, the above inequality holds if and only if

Ω + 𝜀3Ω𝑇1Ω1+ 𝜀3−1Ω3Ω𝑇3+ 𝜀4Ω𝑇2Ω2+ 𝜀4−1Ω4Ω𝑇4 < 0. (57) Then by using Schur complement equivalence, the inequality in (57) is equivalent to (44). Substituting𝐿,𝐿𝑑, and𝐺in (45) with𝐿 + Δ𝐿,𝐿𝑑+ Δ𝐿𝑑, and𝐺 + Δ𝐺, respectively, we can get Υ +sym(Υ1𝑇Δ𝑇3Υ3𝑇) +sym(Υ2𝑇Δ𝑇2Υ4𝑇) > 0, (58) where

Υ1= [𝑁𝐿 𝑁𝐿𝑑 𝑁𝐺 0] , Υ2= [𝑁𝐶 𝑁𝐶𝑑 𝑁𝐷 0]

Υ3= [0 0 0 𝑀𝑇3] , Υ4= [0 0 0 𝑀2𝑇𝐷𝑇𝑓] . (59)

Referensi

Dokumen terkait

Submit your manuscripts at http://www.hindawi.com Stem Cells International Hindawi Publishing Corporation http://www.hindawi.com Volume 2014 Hindawi Publishing Corporation

Submit your manuscripts at http://www.hindawi.com Stem Cells International Hindawi Publishing Corporation http://www.hindawi.com Volume 2014 Hindawi Publishing Corporation

Submit your manuscripts at http://www.hindawi.com Scientifica Hindawi Publishing Corporation http://www.hindawi.com Volume 2014 Hindawi Publishing Corporation

Submit your manuscripts at http://www.hindawi.com Stem Cells International Hindawi Publishing Corporation http://www.hindawi.com Volume 2014 Hindawi Publishing Corporation

Submit your manuscripts at http://www.hindawi.com Stem Cells International Hindawi Publishing Corporation http://www.hindawi.com Volume 2014 Hindawi Publishing Corporation

Submit your manuscripts at http://www.hindawi.com Hindawi Publishing Corporation http://www.hindawi.com Volume 2014 MathematicsJournal of Hindawi Publishing Corporation

Submit your manuscripts at http://www.hindawi.com Hindawi Publishing Corporation http://www.hindawi.com Volume 2014 MathematicsJournal of Hindawi Publishing Corporation

Submit your manuscripts at http://www.hindawi.com Stem Cells International Hindawi Publishing Corporation http://www.hindawi.com Volume 2014 Hindawi Publishing Corporation