92 research outputs found
On the possible divergence of the projection algorithm
By means of an example, the authors show that the sequence of estimates generated by the projection algorithm does not always converge. The authors' construction shows that convergence is not automatically among the properties that can be derived without additional assumptions on the input sequenc
Adaptive tracking control of nonholonomic systems: an example
We study an example of an adaptive (state) tracking control problem for a four-wheel mobile robot, as it is an illustrative example of the general adaptive state-feedback tracking control problem. It turns out that formulating the adaptive state-feedback tracking control problem is not straightforward, since specifying the reference state-trajectory can be in conflict with not knowing certain parameters. Our example illustrates this difficulty and we propose a problem formulation for the adaptive state-feedback tracking problem that meets the natural prerequisite that it reduces to the state-feedback tracking problem if the parameters are known. A general methodology for solving the problem is derive
Filtered output feedback tracking control of a quadrotor UAV
We present a tracking controller for quadrotor UAVs which uses partial state information and filters the measurements to attenuate noise. We show uniform almost global asymptotic and local exponential stability of the resulting closed-loop system, which implies robustness against bounded disturbances. We illustrate the performance of the controller by means of several numerical examples, including a complex looping maneuver.</p
A Robust Observer with Gyroscopic Bias Correction for Rotational Dynamics
We propose an observer for rotational dynamics subject to directional and gyroscopic measurements, which simultaneously estimates the gyroscopic biases and attitude rates. We show uniform almost global asymptotic and local exponential stability of the resulting error dynamics, implying robustness against bounded disturbances. This robustness is quantified with respect to a popular nonlinear complementary filter in quantitative simulation studies, and we explore how the measurement noise propagates to the asymptotic errors as a function of tuning. This is an extended version of a paper with the same title (to appear at IFAC WC 2023). Additional mathematical details are provided in this extended version.We propose an observer for rotational dynamics subject to directional and gyroscopic measurements, which simultaneously estimates the gyroscopic biases and attitude rates. We show uniform almost global asymptotic and local exponential stability of the resulting error dynamics, implying robustness against bounded disturbances. This robustness is quantified with respect to a popular nonlinear complementary filter in quantitative simulation studies, and we explore how the measurement noise propagates to the asymptotic errors as a function of tuning. This is an extended version of a paper with the same title (to appear at IFAC WC 2023). Additional mathematical details are provided in this extended version
A Stochastic Model Predictive Control Approach for Driver-Aided Intersection Crossing With Uncertain Driver Time Delay
We investigate the problem of coordinating human-driven vehicles in road
intersections without any traffic lights or signs by issuing speed advices. The
vehicles in the intersection are assumed to move along an a priori known path
and to be connected via vehicle-to-vehicle communication. The challenge arises
with the uncertain driver reaction to a speed advice, especially in terms of
the driver reaction time delay, as it might lead to unstable system dynamics.
For this control problem, a distributed stochastic model predictive control
concept is designed which accounts for driver uncertainties. By optimizing over
scenarios, which are sequences of independent and identically distributed
samples of the uncertainty over the prediction horizon, we can give
probabilistic guarantees on constraint satisfaction. Simulation results
demonstrate that the scenario-based approach is able to avoid collisions in
spite of uncertainty while the non-stochastic baseline controller is not.Comment: Submitted to European Control Conference 2019 (ECC19
Linear controllers for tracking chained-form systems
In this paper we study the tracking problem for the class of nonholonomic systems in chained-form. In particular, with the first and the last state component of the chained-form as measurable output signals, we suggest a solution for the tracking problem using output feedback by combining a time-varying state feedback controller with an observer for the chained-form system. For the stability analysis of the "certainty equivalence type" of controller we use a cascaded systems approach. The resulting closed loop system is globally K-exponentially stable
Impact Sensitivity Analysis of Cooperative Adaptive Cruise Control Against Resource-Limited Adversaries
Cooperative Adaptive Cruise Control (CACC) is a technology that allows groups of vehicles to form in automated, tightly-coupled platoons. CACC schemes exploit Vehicle-to-Vehicle (V2V) wireless communications to exchange information between vehicles. However, the use of communication networks brings security concerns as it exposes network access points that the adversary can exploit to disrupt the vehicles' operation and even cause crashes. In this manuscript, we present a sensitivity analysis of CACC schemes against a class of resource-limited attacks. We present a modelling framework that allows us to systematically compute outer ellipsoidal approximations of reachable sets induced by attacks. We use the size of these sets as a security metric to quantify the potential damage of attacks affecting different signals in a CACC-controlled vehicle and study how two key system parameters change this metric. We carry out a sensitivity analysis for two different controller implementations (as given the available sensors there is an infinite number of realizations of the same controller) and show how different controller realizations can significantly affect the impact of attacks. We present extensive simulation experiments to illustrate the results.Cooperative Adaptive Cruise Control (CACC) is a technology that allows groups of vehicles to form in automated, tightly-coupled platoons. CACC schemes exploit Vehicle-to-Vehicle (V2V) wireless communications to exchange information between vehicles. However, the use of communication networks brings security concerns as it exposes network access points that the adversary can exploit to disrupt the vehicles' operation and even cause crashes. In this manuscript, we present a sensitivity analysis of CACC schemes against a class of resource-limited attacks. We present a modelling framework that allows us to systematically compute outer ellipsoidal approximations of reachable sets induced by attacks. We use the size of these sets as a security metric to quantify the potential damage of attacks affecting different signals in a CACC-controlled vehicle and study how two key system parameters change this metric. We carry out a sensitivity analysis for two different controller implementations (as given the available sensors there is an infinite number of realizations of the same controller) and show how different controller realizations can significantly affect the impact of attacks. We present extensive simulation experiments to illustrate the results
Impact Sensitivity Analysis of Cooperative Adaptive Cruise Control Against Resource-Limited Adversaries
Cooperative Adaptive Cruise Control (CACC) is a promising technology that
allows groups of vehicles to form in automated tightly-coupled platoons. CACC
schemes exploit Vehicle-to-Vehicle (V2V) wireless communications to exchange
kinematic information among adjacent vehicles. However, the use of
communication networks brings security concerns as cyberattacks could access
the vehicles' internal networks and computers to disrupt their operation and
even cause crashes. In this manuscript, we present a sensitivity analysis of
standard CACC schemes against a class of resource-limited attacks. We present a
modelling framework that allows us to systematically compute outer ellipsoidal
approximations of reachable sets induced by attacks. We use the size of these
sets as a security metric to quantify the potential damage of attacks entering
the dynamics at different points and study how two key system parameters
(sampling and headway constant) change these metrics. We carry out the latter
sensitivity analysis for two different controller implementations (as given the
available sensors there is an infinite number of realizations of the same
controller) and show how different implementations can significantly affect the
impact of attacks. We present extensive simulation experiments to illustrate
our ideas
Saturated stabilization and tracking of a nonholonomic mobile robot
Abstract This paper presents a framework to deal with the problem of global stabilization and global tracking control for the kinematic model of a wheeled mobile robot in the presence of input saturations. A model-based control design strategy is developed via a simple application of passivity and normalization. Saturated, Lipschitz continuous, time-varying feedback laws are obtained and illustrated in a number of compelling simulations
- …