88 research outputs found

    On the possible divergence of the projection algorithm

    Get PDF
    By means of an example, the authors show that the sequence of estimates generated by the projection algorithm does not always converge. The authors' construction shows that convergence is not automatically among the properties that can be derived without additional assumptions on the input sequenc

    Adaptive tracking control of nonholonomic systems: an example

    Get PDF
    We study an example of an adaptive (state) tracking control problem for a four-wheel mobile robot, as it is an illustrative example of the general adaptive state-feedback tracking control problem. It turns out that formulating the adaptive state-feedback tracking control problem is not straightforward, since specifying the reference state-trajectory can be in conflict with not knowing certain parameters. Our example illustrates this difficulty and we propose a problem formulation for the adaptive state-feedback tracking problem that meets the natural prerequisite that it reduces to the state-feedback tracking problem if the parameters are known. A general methodology for solving the problem is derive

    Filtered output feedback tracking control of a quadrotor UAV

    Get PDF
    We present a tracking controller for quadrotor UAVs which uses partial state information and filters the measurements to attenuate noise. We show uniform almost global asymptotic and local exponential stability of the resulting closed-loop system, which implies robustness against bounded disturbances. We illustrate the performance of the controller by means of several numerical examples, including a complex looping maneuver.</p

    A Robust Observer with Gyroscopic Bias Correction for Rotational Dynamics

    Get PDF
    We propose an observer for rotational dynamics subject to directional and gyroscopic measurements, which simultaneously estimates the gyroscopic biases and attitude rates. We show uniform almost global asymptotic and local exponential stability of the resulting error dynamics, implying robustness against bounded disturbances. This robustness is quantified with respect to a popular nonlinear complementary filter in quantitative simulation studies, and we explore how the measurement noise propagates to the asymptotic errors as a function of tuning. This is an extended version of a paper with the same title (to appear at IFAC WC 2023). Additional mathematical details are provided in this extended version.We propose an observer for rotational dynamics subject to directional and gyroscopic measurements, which simultaneously estimates the gyroscopic biases and attitude rates. We show uniform almost global asymptotic and local exponential stability of the resulting error dynamics, implying robustness against bounded disturbances. This robustness is quantified with respect to a popular nonlinear complementary filter in quantitative simulation studies, and we explore how the measurement noise propagates to the asymptotic errors as a function of tuning. This is an extended version of a paper with the same title (to appear at IFAC WC 2023). Additional mathematical details are provided in this extended version

    A Stochastic Model Predictive Control Approach for Driver-Aided Intersection Crossing With Uncertain Driver Time Delay

    Full text link
    We investigate the problem of coordinating human-driven vehicles in road intersections without any traffic lights or signs by issuing speed advices. The vehicles in the intersection are assumed to move along an a priori known path and to be connected via vehicle-to-vehicle communication. The challenge arises with the uncertain driver reaction to a speed advice, especially in terms of the driver reaction time delay, as it might lead to unstable system dynamics. For this control problem, a distributed stochastic model predictive control concept is designed which accounts for driver uncertainties. By optimizing over scenarios, which are sequences of independent and identically distributed samples of the uncertainty over the prediction horizon, we can give probabilistic guarantees on constraint satisfaction. Simulation results demonstrate that the scenario-based approach is able to avoid collisions in spite of uncertainty while the non-stochastic baseline controller is not.Comment: Submitted to European Control Conference 2019 (ECC19

    Linear controllers for tracking chained-form systems

    Get PDF
    In this paper we study the tracking problem for the class of nonholonomic systems in chained-form. In particular, with the first and the last state component of the chained-form as measurable output signals, we suggest a solution for the tracking problem using output feedback by combining a time-varying state feedback controller with an observer for the chained-form system. For the stability analysis of the &quot;certainty equivalence type&quot; of controller we use a cascaded systems approach. The resulting closed loop system is globally K-exponentially stable

    Impact Sensitivity Analysis of Cooperative Adaptive Cruise Control Against Resource-Limited Adversaries

    Get PDF
    Cooperative Adaptive Cruise Control (CACC) is a technology that allows groups of vehicles to form in automated, tightly-coupled platoons. CACC schemes exploit Vehicle-to-Vehicle (V2V) wireless communications to exchange information between vehicles. However, the use of communication networks brings security concerns as it exposes network access points that the adversary can exploit to disrupt the vehicles' operation and even cause crashes. In this manuscript, we present a sensitivity analysis of CACC schemes against a class of resource-limited attacks. We present a modelling framework that allows us to systematically compute outer ellipsoidal approximations of reachable sets induced by attacks. We use the size of these sets as a security metric to quantify the potential damage of attacks affecting different signals in a CACC-controlled vehicle and study how two key system parameters change this metric. We carry out a sensitivity analysis for two different controller implementations (as given the available sensors there is an infinite number of realizations of the same controller) and show how different controller realizations can significantly affect the impact of attacks. We present extensive simulation experiments to illustrate the results.Cooperative Adaptive Cruise Control (CACC) is a technology that allows groups of vehicles to form in automated, tightly-coupled platoons. CACC schemes exploit Vehicle-to-Vehicle (V2V) wireless communications to exchange information between vehicles. However, the use of communication networks brings security concerns as it exposes network access points that the adversary can exploit to disrupt the vehicles' operation and even cause crashes. In this manuscript, we present a sensitivity analysis of CACC schemes against a class of resource-limited attacks. We present a modelling framework that allows us to systematically compute outer ellipsoidal approximations of reachable sets induced by attacks. We use the size of these sets as a security metric to quantify the potential damage of attacks affecting different signals in a CACC-controlled vehicle and study how two key system parameters change this metric. We carry out a sensitivity analysis for two different controller implementations (as given the available sensors there is an infinite number of realizations of the same controller) and show how different controller realizations can significantly affect the impact of attacks. We present extensive simulation experiments to illustrate the results

    Impact Sensitivity Analysis of Cooperative Adaptive Cruise Control Against Resource-Limited Adversaries

    Full text link
    Cooperative Adaptive Cruise Control (CACC) is a promising technology that allows groups of vehicles to form in automated tightly-coupled platoons. CACC schemes exploit Vehicle-to-Vehicle (V2V) wireless communications to exchange kinematic information among adjacent vehicles. However, the use of communication networks brings security concerns as cyberattacks could access the vehicles' internal networks and computers to disrupt their operation and even cause crashes. In this manuscript, we present a sensitivity analysis of standard CACC schemes against a class of resource-limited attacks. We present a modelling framework that allows us to systematically compute outer ellipsoidal approximations of reachable sets induced by attacks. We use the size of these sets as a security metric to quantify the potential damage of attacks entering the dynamics at different points and study how two key system parameters (sampling and headway constant) change these metrics. We carry out the latter sensitivity analysis for two different controller implementations (as given the available sensors there is an infinite number of realizations of the same controller) and show how different implementations can significantly affect the impact of attacks. We present extensive simulation experiments to illustrate our ideas

    Saturated stabilization and tracking of a nonholonomic mobile robot

    Get PDF
    Abstract This paper presents a framework to deal with the problem of global stabilization and global tracking control for the kinematic model of a wheeled mobile robot in the presence of input saturations. A model-based control design strategy is developed via a simple application of passivity and normalization. Saturated, Lipschitz continuous, time-varying feedback laws are obtained and illustrated in a number of compelling simulations

    Output Feedback Tracking of Ships

    Full text link
    • …
    corecore