Abstract
This paper investigates the robust stability of uncertain neural networks with time-varying delays and Markoian Jump parameters. The norm-bounded uncertainties are included in the system matrices. The constraint on time-varying delays is removed, which means that a fast time-varying delay is admissible. Some new delay-dependent stability criterions are presented by using Lyapunov-Krasovskii function and linear matrix inequalities (LMIs) approach. Finally, a numerical example is given to illustrate the effectiveness and less conservativeness of the developed techniques.
Original language | English |
---|---|
Title of host publication | Proceedings - International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC 2009 |
Pages | 809-813 |
Number of pages | 5 |
DOIs | |
Publication status | Published - 2009 |
Event | International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC 2009 - Wuhan, Hubei, China Duration: 25 Apr 2009 → 26 Apr 2009 |
Publication series
Name | Proceedings - International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC 2009 |
---|---|
Volume | 2 |
Conference
Conference | International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC 2009 |
---|---|
Country/Territory | China |
City | Wuhan, Hubei |
Period | 25/04/09 → 26/04/09 |
Keywords
- Jump parameters
- Neural networks
- Parameters uncertainties
- Robust stability
Fingerprint
Dive into the research topics of 'Robust stability analysis for uncertain delayed neural networks with Markoian jump parameters'. Together they form a unique fingerprint.Cite this
Lin, Z., & Kan, J. (2009). Robust stability analysis for uncertain delayed neural networks with Markoian jump parameters. In Proceedings - International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC 2009 (pp. 809-813). Article 4908592 (Proceedings - International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC 2009; Vol. 2). https://doi.org/10.1109/NSWCTC.2009.208