Table 2 Upper bound of \(\varepsilon _2\).

From: Extended dissipative truncated predictive control strategy for conic-type delayed networked control systems affected by cyber attacks and sensor distortion

Methods

In Ref40. Example 1

In Ref40. Example 2

\(\mathbf {C_1}\)

\(\mathbf {C_2}\)

\(\mathbf {C_3}\)

\(\mathbf {C_4}\)

\(\varepsilon _2\)

0.0602

0.025

0.0759

0.1119

0.1121

0.0985