| Volume 20,Issue 1,2022 Table of Contents
Research Articles | | | Learning-based adaptive optimal output regulation of linear and nonlinear systems: An overview | | Weinan Gao1, Zhong-Ping Jiang2 | | 2022,20(1):1-19 [Abstract(628)] [View PDF] | | | | Adaptive output regulation for cyber-physical systems under time-delay attacks | | Dan Jin1, Bo Chen1, Li Yu1, Shichao Liu2 | | 2022,20(1):20-31 [Abstract(546)] [View PDF] | | | | Distributed robust MPC for nonholonomic robots with obstacle and collision avoidance | | Li Dai1, Yanye Hao2, Huahui Xie1, Zhongqi Sun1,3, Yuanqing Xia1 | | 2022,20(1):32-45 [Abstract(596)] [View PDF] | | | | Consensus control of feedforward nonlinear multi-agent systems: A time-varying gain method | | Hanfeng Li, Xianfu Zhang, Weihao Pan | | 2022,20(1):46-53 [Abstract(718)] [View PDF] | | | | Suppression of high order disturbances and tracking for nonchaotic systems: A time-delayed state feedback approach | | Zahed Dastan, Mahsan Tavakoli-Kakhki | | 2022,20(1):54-68 [Abstract(508)] [View PDF] | | | | Constrained nonlinear MPC for accelerated tracking piece-wise references and its applications to thermal systems | | Defeng He1, Qingsong Wang1, Ping Han1, Haiping Du2 | | 2022,20(1):69-79 [Abstract(506)] [View PDF] | | | | Adaptive robust simultaneous stabilization of multiple n-degree-of-freedom robot systems | | Haiying Zhang, Renming Yang | | 2022,20(1):80-94 [Abstract(518)] [View PDF] | | | | Safety stabilization of switched systems with unstable subsystems | | Lijun Long1, Yiguang Hong2 | | 2022,20(1):95-102 [Abstract(472)] [View PDF] | | | | Bearing fault diagnosis with cascaded space projection and a CNN | | Yunji Zhao, Menglin Zhou, Li Wang, Xiaozhuo Xu, Nannan Zhang | | 2022,20(1):103-113 [Abstract(526)] [View PDF] | | | | System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: defense scheme and its optimality | | Jin Guo1,2, Xuebin Wang1,2, Yanling Zhang1,2, Wenchao Xue3, Yanlong Zhao3 | | 2022,20(1):114-126 [Abstract(596)] [View PDF] | | | | System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: the optimality of attack strategy | | Jin Guo1,2, Xuebin Wang1,2, Yanling Zhang1,2, Wenchao Xue3, Yanlong Zhao3 | | 2022,20(1):127-138 [Abstract(594)] [View PDF] | | |
Letter
|