Robust constrained control for a class of uncertain systems based on disturbance observer

Ming Suo Li, Mou Chen, Guang Shan Lu, Wen Hua Chen

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

1 Citation (Scopus)

Abstract

In this paper, the robust control problem is investigated for a class of uncertain systems with control input constraints based on disturbance observers. The disturbance observer is developed to estimate the compounded disturbance integrating the unknown external disturbance with the influence of control input constraints which is closely generated by an exogenous system. The design parameter of the disturbance observer is achieved by solving linear matrix inequality (LMI). Using the approximation output of the disturbance observer, the robust control scheme is proposed for the uncertain system. By utilizing the Lyapunov analysis method and combining it with linear matrix inequality technique, the robust stability of the closed-loop system is proved. Finally, a numerical example is given to illustrate the proposed robust control scheme for uncertain systems.

Original languageEnglish
Title of host publicationProceedings of the 31st Chinese Control Conference, CCC 2012
Pages2781-2785
Number of pages5
Publication statusPublished - 2012
Event31st Chinese Control Conference, CCC 2012 - Hefei, China
Duration: 25 Jul 201227 Jul 2012

Publication series

NameChinese Control Conference, CCC
ISSN (Print)1934-1768
ISSN (Electronic)2161-2927

Conference

Conference31st Chinese Control Conference, CCC 2012
Country/TerritoryChina
CityHefei
Period25/07/1227/07/12

Keywords

  • Disturbance observer
  • LMI
  • Robust control
  • Uncertain system

ASJC Scopus subject areas

  • Computer Science Applications
  • Control and Systems Engineering
  • Applied Mathematics
  • Modelling and Simulation

Fingerprint

Dive into the research topics of 'Robust constrained control for a class of uncertain systems based on disturbance observer'. Together they form a unique fingerprint.

Cite this