130 research outputs found

    Analysis of the Effects of Failure and Noise in the Distributed Connectivity Maintenance of a Multi-robot System

    Full text link
    To perform cooperative tasks in a decentralized manner, multi-robot systems are often required to communicate with each other. Therefore, maintaining the communication graph connectivity is a fundamental issue when roaming a territory with obstacles. However, when dealing with real-robot systems, several sources of data corruption can appear in the agent interaction. In this paper, the effects of failure and noise in the communication between agents are analyzed upon a connectivity maintenance control strategy. The results show that the connectivity strategy is resilient to the negative effects of such disturbances under realistic settings that consider a bandwidth limit for the control effort. This opens the perspective of applying the connectivity maintenance strategy in adaptive schemes that consider, for instance, autonomous adaptation to constraints other than connectivity itself, e.g. communication efficiency and energy harvesting.Comment: 6 pages, 7 figures, published in CINTI 201

    collision avoidance for multiple lagrangian dynamical systems with gyroscopic forces

    Get PDF
    This article introduces a novel methodology for dealing with collision avoidance for groups of mobile robots. In particular, full dynamics are considered, since each robot is modeled as a Lagrangian dynamical system moving in a three-dimensional environment. Gyroscopic forces are utilized for defining the collision avoidance control strategy: This kind of forces leads to avoiding collisions, without interfering with the convergence properties of the multi-robot system's desired control law. Collision avoidance introduces, in fact, a perturbation on the nominal behavior of the system: We define a method for choosing the direction of the gyroscopic force in an optimal manner, in such a way that perturbation is minimized. Collision avoidance and convergence properties are analytically demonstrated, and simulation results are provided for validation purpose

    Control Theory: A Mathematical Perspective on Cyber-Physical Systems

    Get PDF
    Control theory is an interdisciplinary field that is located at the crossroads of pure and applied mathematics with systems engineering and the sciences. Recently the control field is facing new challenges motivated by application domains that involve networks of systems. Examples are interacting robots, networks of autonomous cars or the smart grid. In order to address the new challenges posed by these application disciplines, the special focus of this workshop has been on the currently very active field of Cyber-Physical Systems, which forms the underlying basis for many network control applications. A series of lectures in this workshop was devoted to give an overview on current theoretical developments in Cyber-Physical Systems, emphasizing in particular the mathematical aspects of the field. Special focus was on the dynamics and control of networks of systems, distributed optimization and formation control, fundamentals of nonlinear interconnected systems, as well as open problems in control

    Optimal control and approximations

    Get PDF

    Optimal control and approximations

    Get PDF

    EU-Russia regional cooperation and energy networks in the Russian northwestern and southern regions: implications for democratic governance

    Get PDF
    This dissertation seeks to explain variation in democratic governance in the Russian regions, in particular, in the Northwestern and the Southern regions, which are included in the regional dimensions of the European Union Neighborhood Policy: the Northern Dimension and the Black Sea Synergy, respectively. Emphasizing a dynamic relationship between regional governance patterns in the EU-Russia regional cooperation and energy regional domains, regional ethno-cultural, historical, geopolitical, and economic contexts, and regional decision-making processes, it develops a model of sub-national democratic development and sub-national regionalism that links regional sustainable development and democratic governance to the multi-dimensionality of the external and internal pressures that shape and influence the behavior and the strategic actions of the regional actors, and predetermine the configuration of relationships among them. The propositions of the model are tested empirically using both quantitative (econometric analysis of longitudinal data and longitudinal network analysis) and qualitative (interview data) methods. The findings of the analyses have implications for our understanding of sub-national regionalism in the Wider Europe and for the study of democratization and regional development more generally

    Cooperative control for multi-vehicle swarms

    Get PDF
    The cooperative control of large-scale multi-agent systems has gained a significant interest in recent years from the robotics and control communities for multi-vehicle control. One motivator for the growing interest is the application of spatially and temporally distributed multiple unmanned aerial vehicle (UAV) systems for distributed sensing and collaborative operations. In this research, the multi-vehicle control problem is addressed using a decentralised control system. The work aims to provide a decentralised control framework that synthesises the self-organised and coordinated behaviour of natural swarming systems into cooperative UAV systems. The control system design framework is generalised for application into various other multi-agent systems including cellular robotics, ad-hoc communication networks, and modular smart-structures. The approach involves identifying su itable relationships that describe the behaviour of the UAVs within the swarm and the interactions of these behaviours to produce purposeful high-level actions for system operators. A major focus concerning the research involves the development of suitable analytical tools that decomposes the general swarm behaviours to the local vehicle level. The control problem is approached using two-levels of abstraction; the supervisory level, and the local vehicle level. Geometric control techniques based on differential geometry are used at the supervisory level to reduce the control problem to a small set of permutation and size invariant abstract descriptors. The abstract descriptors provide an open-loop optimal state and control trajectory for the collective swarm and are used to describe the intentions of the vehicles. Decentralised optimal control is implemented at the local vehicle level to synthesise self-organised and cooperative behaviour. A deliberative control scheme is implemented at the local vehicle le vel that demonstrates autonomous, cooperative and optimal behaviour whilst the preserving precision and reliability at the local vehicle level

    Analysis and design of security mechanisms in the context of Advanced Persistent Threats against critical infrastructures

    Get PDF
    Industry 4.0 can be defined as the digitization of all components within the industry, by combining productive processes with leading information and communication technologies. Whereas this integration has several benefits, it has also facilitated the emergence of several attack vectors. These can be leveraged to perpetrate sophisticated attacks such as an Advanced Persistent Threat (APT), that ultimately disrupts and damages critical infrastructural operations with a severe impact. This doctoral thesis aims to study and design security mechanisms capable of detecting and tracing APTs to ensure the continuity of the production line. Although the basic tools to detect individual attack vectors of an APT have already been developed, it is important to integrate holistic defense solutions in existing critical infrastructures that are capable of addressing all potential threats. Additionally, it is necessary to prospectively analyze the requirements that these systems have to satisfy after the integration of novel services in the upcoming years. To fulfill these goals, we define a framework for the detection and traceability of APTs in Industry 4.0, which is aimed to fill the gap between classic security mechanisms and APTs. The premise is to retrieve data about the production chain at all levels to correlate events in a distributed way, enabling the traceability of an APT throughout its entire life cycle. Ultimately, these mechanisms make it possible to holistically detect and anticipate attacks in a timely and autonomous way, to deter the propagation and minimize their impact. As a means to validate this framework, we propose some correlation algorithms that implement it (such as the Opinion Dynamics solution) and carry out different experiments that compare the accuracy of response techniques that take advantage of these traceability features. Similarly, we conduct a study on the feasibility of these detection systems in various Industry 4.0 scenarios

    Non-Hierarchical Networks for Censorship-Resistant Personal Communication.

    Full text link
    The Internet promises widespread access to the world’s collective information and fast communication among people, but common government censorship and spying undermines this potential. This censorship is facilitated by the Internet’s hierarchical structure. Most traffic flows through routers owned by a small number of ISPs, who can be secretly coerced into aiding such efforts. Traditional crypographic defenses are confusing to common users. This thesis advocates direct removal of the underlying heirarchical infrastructure instead, replacing it with non-hierarchical networks. These networks lack such chokepoints, instead requiring would-be censors to control a substantial fraction of the participating devices—an expensive proposition. We take four steps towards the development of practical non-hierarchical networks. (1) We first describe Whisper, a non-hierarchical mobile ad hoc network (MANET) architecture for personal communication among friends and family that resists censorship and surveillance. At its core are two novel techniques, an efficient routing scheme based on the predictability of human locations anda variant of onion-routing suitable for decentralized MANETs. (2) We describe the design and implementation of Shout, a MANET architecture for censorship-resistant, Twitter-like public microblogging. (3) We describe the Mason test, amethod used to detect Sybil attacks in ad hoc networks in which trusted authorities are not available. (4) We characterize and model the aggregate behavior of Twitter users to enable simulation-based study of systems like Shout. We use our characterization of the retweet graph to analyze a novel spammer detection technique for Shout.PhDComputer Science & EngineeringUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttp://deepblue.lib.umich.edu/bitstream/2027.42/107314/1/drbild_1.pd
    • …
    corecore