2020
DOI: 10.1155/2020/8867820
|View full text |Cite
|
Sign up to set email alerts
|

Energy-Limited Time-Varying Formation Control for Second-Order Multiagent Systems

Abstract: The energy-limited time-varying formation (ETVF) control problem of second-order multiagent systems (MAS) is addressed for both leaderless and leader-following communication topologies in this paper. Different from the previous results, the joint consideration of energy limitation and formation design is more challenging and practical. First, an ETVF control protocol is presented, and the total energy supply is pregiven and limited, which is more common in practical applications. Then, by an orthogonal transfo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 39 publications
(54 reference statements)
0
1
0
Order By: Relevance
“…For agents that operate in real physical environments, more practical conditions should be considered. For example, the performance-constraint consensus control of MAS are considered in Xi et al, 26 Quan et al 27 They study cost-guaranteed or energy-constraint time-varying formation control of MASs based on switching topology for leader-following / leaderless MASs. Although the above literatures study the constrained consensus of MASs, they did not consider the security of the system, for example, DoS, state-dependent attacks and dynamic attacks.…”
Section: Introductionmentioning
confidence: 99%
“…For agents that operate in real physical environments, more practical conditions should be considered. For example, the performance-constraint consensus control of MAS are considered in Xi et al, 26 Quan et al 27 They study cost-guaranteed or energy-constraint time-varying formation control of MASs based on switching topology for leader-following / leaderless MASs. Although the above literatures study the constrained consensus of MASs, they did not consider the security of the system, for example, DoS, state-dependent attacks and dynamic attacks.…”
Section: Introductionmentioning
confidence: 99%