2022
DOI: 10.1016/j.cja.2021.10.035
|View full text |Cite
|
Sign up to set email alerts
|

Output formation tracking for networked systems with limited energy and aperiodic silence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7

Relationship

3
4

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 33 publications
0
10
0
Order By: Relevance
“…Moreover, the matrix converter can also be utilized for the pulse magnet power supply of ion 2 Complexity accelerators. Bidirectional flowage of energy in the matrix converter can transmit excessive energy of the magnet back to the grid [18][19][20]. e study is a continuation of our preliminary researches [21,22].…”
Section: Introductionmentioning
confidence: 79%
“…Moreover, the matrix converter can also be utilized for the pulse magnet power supply of ion 2 Complexity accelerators. Bidirectional flowage of energy in the matrix converter can transmit excessive energy of the magnet back to the grid [18][19][20]. e study is a continuation of our preliminary researches [21,22].…”
Section: Introductionmentioning
confidence: 79%
“…It can be concluded that the feasibility of the LMI can ensure the feasibility of M linear matrix inequalities. Therefore, if WA T + AW − BB T < 0, then one can obtain via (12) that…”
Section: Theorem 1 Interconnected Network (1) Is Minimum-energy Forma...mentioning
confidence: 99%
“…For the leaderless formation, agents form and maintain a specific geometric structure to finish some tasks by a distributed manner. In Reference 12, the formation tracking control for interconnected networks was addressed and criteria for the formation achievement were presented. Liu et al 13 presented a design approach of the robust formation controller and applied their theoretical results on the formation behavior analysis of unmanned underwater vehicles.…”
Section: Introductionmentioning
confidence: 99%
“…In References 24 and 25, a secure impulsive consensus control strategy was investigated to obtain ultimate uniformly bounded consensus for the MASs suffering from false data injection attacks, and the upper bounds of the consensus errors were given. Moreover, the design and analysis problems of secure formation and consensus are addressed respectively for MASs with the intermittent communication in References 26‐29, and some meaningful results are given. In the above works, it was assumed that weights of communication links are time‐invariant or the communication topology is deterministic.…”
Section: Introductionmentioning
confidence: 99%