Engineering
Noisy Data
95%
Denial-of-Service Attack
71%
Input State
48%
Agent System
47%
Linear Quadratic Gaussian
47%
Numerical Example
46%
Predictive Control Model
34%
Control Scheme
34%
Linear Time Invariant
33%
Invariant System
33%
Model System
28%
Predictive Control
23%
Control Law
23%
Finite Horizon
23%
State Stability
22%
Feedback Control System
22%
Controller Gain
19%
Control Strategy
16%
Output Data
16%
Divergence Rate
16%
System Matrix
12%
Collected Data
11%
Control Design
11%
Design Control
11%
Control Input
11%
Encoder Side
11%
Determines
11%
Systems Performance
11%
Boundedness
11%
Approximate Solution
11%
Stability Condition
11%
Synchronization Problem
11%
Measured Data
11%
Switching Frequency
11%
State Feedback
11%
Mild Condition
11%
Joints (Structural Components)
10%
Exponential Stability
10%
Process Noise
10%
State Estimation
10%
Measurement Noise
10%
Observer Gain
9%
Controllability Index
7%
Demonstrates
7%
Design Method
7%
Computer Simulation
7%
Closed Loop
7%
State Measurement
5%
State Constant
5%
Sustained Development
5%
Computer Science
Denial of Service Attack
100%
Linear Systems
91%
Numerical Example
70%
Consensus Control
47%
Denial-of-Service
47%
Multi Agent Systems
41%
Predictive Model
34%
Feedback Control
31%
State Feedback
31%
linear time invariant system
30%
Control Method
29%
Quantization (Signal Processing)
29%
Encoding Scheme
23%
Triggered Event
23%
False Data Injection Attacks
23%
Input/Output
23%
Definite Program
22%
Triggering Time
19%
System Identification
17%
State Measurement
17%
Control Strategy
16%
Current-State
16%
Communication Overhead
11%
Successful Transmission
11%
Collected Data
11%
Control Parameter
11%
System Trajectory
11%
Service Duration
11%
Can Controller
11%
Systems Performance
11%
Predicted State
7%
continuous-time
7%
Unknown Parameter
7%
Optimization Problem
7%
And-States
7%
Switching Frequency
7%
Channel Attack
7%
Mild Condition
7%
Attack Model
7%
Participatory Design
5%
Numerical Simulation
5%
linear matrix
5%
Research Effort
5%
Sufficient Condition
5%
Driven Approach
5%
Asymptotic Stability
5%
Control Protocol
5%
Computational Complexity
5%