5,350 research outputs found

    Pose consensus based on dual quaternion algebra with application to decentralized formation control of mobile manipulators

    Full text link
    This paper presents a solution based on dual quaternion algebra to the general problem of pose (i.e., position and orientation) consensus for systems composed of multiple rigid-bodies. The dual quaternion algebra is used to model the agents' poses and also in the distributed control laws, making the proposed technique easily applicable to time-varying formation control of general robotic systems. The proposed pose consensus protocol has guaranteed convergence when the interaction among the agents is represented by directed graphs with directed spanning trees, which is a more general result when compared to the literature on formation control. In order to illustrate the proposed pose consensus protocol and its extension to the problem of formation control, we present a numerical simulation with a large number of free-flying agents and also an application of cooperative manipulation by using real mobile manipulators

    Time-Delay Switch Attack on Networked Control Systems, Effects and Countermeasures

    Get PDF
    In recent years, the security of networked control systems (NCSs) has been an important challenge for many researchers. Although the security schemes for networked control systems have advanced in the past several years, there have been many acknowledged cyber attacks. As a result, this dissertation proposes the use of a novel time-delay switch (TDS) attack by introducing time delays into the dynamics of NCSs. Such an attack has devastating effects on NCSs if prevention techniques and countermeasures are not considered in the design of these systems. To overcome the stability issue caused by TDS attacks, this dissertation proposes a new detector to track TDS attacks in real time. This method relies on an estimator that will estimate and track time delays introduced by a hacker. Once a detector obtains the maximum tolerable time delay of a plant’s optimal controller (for which the plant remains secure and stable), it issues an alarm signal and directs the system to its alarm state. In the alarm state, the plant operates under the control of an emergency controller that can be local or networked to the plant and remains in this stable mode until the networked control system state is restored. In another effort, this dissertation evaluates different control methods to find out which one is more stable when under a TDS attack than others. Also, a novel, simple and effective controller is proposed to thwart TDS attacks on the sensing loop (SL). The modified controller controls the system under a TDS attack. Also, the time-delay estimator will track time delays introduced by a hacker using a modified model reference-based control with an indirect supervisor and a modified least mean square (LMS) minimization technique. Furthermore, here, the demonstration proves that the cryptographic solutions are ineffective in the recovery from TDS attacks. A cryptography-free TDS recovery (CF-TDSR) communication protocol enhancement is introduced to leverage the adaptive channel redundancy techniques, along with a novel state estimator to detect and assist in the recovery of the destabilizing effects of TDS attacks. The conclusion shows how the CF-TDSR ensures the control stability of linear time invariant systems

    Markov Decision Processes with Applications in Wireless Sensor Networks: A Survey

    Full text link
    Wireless sensor networks (WSNs) consist of autonomous and resource-limited devices. The devices cooperate to monitor one or more physical phenomena within an area of interest. WSNs operate as stochastic systems because of randomness in the monitored environments. For long service time and low maintenance cost, WSNs require adaptive and robust methods to address data exchange, topology formulation, resource and power optimization, sensing coverage and object detection, and security challenges. In these problems, sensor nodes are to make optimized decisions from a set of accessible strategies to achieve design goals. This survey reviews numerous applications of the Markov decision process (MDP) framework, a powerful decision-making tool to develop adaptive algorithms and protocols for WSNs. Furthermore, various solution methods are discussed and compared to serve as a guide for using MDPs in WSNs

    Adaptive consensus based formation control of unmanned vehicles

    Get PDF
    Over the past decade, the control research community has given significant attention to formation control of multiple unmanned vehicles due to a variety of commercial and defense applications. Consensus-based formation control is considered to be more robust and reliable when compared to other formation control methods due to scalability and inherent properties that enable the formation to continue even if one of the vehicles experiences a failure. In contrast to existing methods on formation control where the dynamics of the vehicles are neglected, this dissertation in the form of four papers presents consensus-based formation control of unmanned vehicles-both ground and aerial, by incorporating the vehicle dynamics. First, neural networks (NN)-based optimal adaptive consensus-based formation control over finite horizon is presented for networked mobile robots or agents in the presence of uncertain robot/agent dynamics and communication. In the second paper, a hybrid automaton is proposed to control the nonholonomic mobile robots in two discrete modes: a regulation mode and a formation keeping mode in order to overcome well-known stabilization problem. The third paper presents the design of a distributed consensus-based event-triggered formation control of networked mobile robots using NN in the presence of uncertain robot dynamics to minimize communication. All these papers assume state availability. Finally, the fourth paper extends the consensus effort by introducing the development of a novel nonlinear output feedback NN-based controller for a group of quadrotor UAVs --Abstract, page iv
    • …
    corecore