This paper dresses the optimal control of multiple linear agents in the presence of a set of adversary constraints. This type of constraints makes the convergence of the agents’ dynamics towards the “natural” equil...
详细信息
This paper dresses the optimal control of multiple linear agents in the presence of a set of adversary constraints. This type of constraints makes the convergence of the agents’ dynamics towards the “natural” equilibrium position, impossible to fulfill. Therefore, this default equilibrium point has to be replaced by a set of equilibrium points or even accept the existence of limit cycles. Furthermore, the constraints introduced in the transitory optimization problem are non convex. The present paper proposes a dual-mode control strategy which switches between an unconstrained optimum controller and a constrained control law whenever the adversary constraints are activated. The proposed method builds on invariance concepts and proves to be related to eigenstructure assignment problems. The technique exhibits effective performance and is validated here by an illustrative example.
We present a method for the calculation of approximate explicit solutions to constrained time-optimal control problems for nonlinear discrete-time systems. We aim to pre-compute offline a low complexity control law th...
详细信息
作者:
Marko BunicStjepan BogdanUniversity of Zagreb
Faculty of Electrical Engineering and Computing Department of Control and Computer Engineering LARICS–Laboratory for Robotics and Intelligent Control Systems Zagreb Croatia
This paper presents the extension of the previously proposed method for multi-agent formation control based on potential function. The method derived for 2D space is extended to 3D. It has been shown that the control ...
This paper presents the extension of the previously proposed method for multi-agent formation control based on potential function. The method derived for 2D space is extended to 3D. It has been shown that the control algorithm keeps all the properties of the original scheme in case of multi-agent formation moving in 3D. An adaptation mechanism that assures avoidance of unwanted stable equilibria, used in 2D, is implemented in the same form for 3D formations. The obtained simulation results demonstrate stable behavior of the system for various sets of parameters - the desired 3D formation is reached in finite time and maintained during trajectory execution.
An approach for trajectory optimization for vehicles maneuvering in a constrained environment is developed. Within this framework, a benchmark problem, the minimimzation of the transit time of a point mass vehicle thr...
详细信息
ISBN:
(纸本)9781467320658
An approach for trajectory optimization for vehicles maneuvering in a constrained environment is developed. Within this framework, a benchmark problem, the minimimzation of the transit time of a point mass vehicle through a chicane is proposed. This problem is solved using the projection operator Newton method with barrier functions to manage the acceleration and roadwidth constraints. The numerical solution of the benchmark problem is analyzed in detail as is the characteristics of the solution itself.
This paper proposes a supervisory control structure for networked systems with time-varying delays. The control structure, in which a supervisor triggers the most appropriate controller from a multi-controller unit, a...
详细信息
This paper proposes a novel probabilistic framework to design an N-1 secure day-ahead dispatch, while determining the minimum cost reserves for power systems with high wind penetration. To achieve this, we build on pr...
详细信息
This paper proposes a novel probabilistic framework to design an N-1 secure day-ahead dispatch, while determining the minimum cost reserves for power systems with high wind penetration. To achieve this, we build on previous work, and formulate a stochastic optimization program with chance constraints, which encode the probability of satisfying the transmission capacity constraints of the lines. To incorporate then a reserve decision scheme, we take into account the steady state behavior of the secondary frequency controller, and hence consider the reserves to be a linear function of the total generation-load mismatch. The overall problem results in a chance constrained bilinear program; to achieve tractability, two alternative convex reformulations are proposed, and the so called scenario approach is employed. This approach is based on sampling the uncertain parameter (in this paper the wind power) while keeping the desired probabilistic guarantees. To illustrate the effectiveness of the proposed technique we apply it to the IEEE 30-bus network, and compare the alternative reformulations in terms of cost and performance by means of Monte Carlo simulations, corresponding to different wind power realizations generated by a Markov chain based model.
In this paper we assess the incidence of strategic behavior of demand and supply units in market set ups which should enable the efficient in-feed of renewable energy sources. Therefore, a sequence of energy and reser...
详细信息
In this paper we assess the incidence of strategic behavior of demand and supply units in market set ups which should enable the efficient in-feed of renewable energy sources. Therefore, a sequence of energy and reserve power auctions is modeled in an agent-based framework in order to approximately come up with the drawbacks of the different market designs. The main focus lies on the reserve power market. The generation companies as well as representative consumers are facilitated with Q-learning in order to exploit market flaws. The representative network includes a renewable in-feed, which is characterized by low marginal generation costs. In terms of congestion management, we assume in a first step uniform marginal pricing, in a second step nodal pricing for the energy power auction.
FIR (finite impulse response) model is widely used in tackling the problem of the impulse response estimation with quantized measurements. Its use is, however, limited, in the case when a high order FIR model is requi...
详细信息
FIR (finite impulse response) model is widely used in tackling the problem of the impulse response estimation with quantized measurements. Its use is, however, limited, in the case when a high order FIR model is required to capture a slowly decaying impulse response. This is because the high variance for high order FIR models would override the low bias and thus lead to large MSE (mean square error). In this contribution, we apply the recently introduced regularized FIR model approach to the problem of the impulse response estimation with binary measurements. We show by Monte Carlo simulations that the proposed approach can yield both better accuracy and better robustness than a recently introduced FIR model based approach.
The use of remote laboratories has become a common technique in universities to provide educational services related to engineering. However, the development efforts of these laboratories have not been contemplated in...
详细信息
The use of remote laboratories has become a common technique in universities to provide educational services related to engineering. However, the development efforts of these laboratories have not been contemplated in a structured way, with no specific methodologies that allow the reuse of such laboratories or parts thereof. This problem of structured and methodological development is associated with a number of disadvantages which imply that the development of new labs or their integration with other services is a complex task. This paper shows how this goal can be achieved using RELATED (REmote LAboratories exTendED). It is shown the development model proposed by this methodology, as well as the services provided by this development framework. The article shows an example of application of this methodology, using a magnetic levitation system, which is prepared for “on-site” experiences. From this laboratory, and following specific methodological steps, is shown as is possible to reuse developed code and provide a set of remote experiments for the magnetic levitation system.
After a general introduction of the VIKING EU FP7 project two specific cyber-attack mechanisms, which have been analyzed in the VIKING project, will be discussed in more detail. Firstly an attack and its consequences ...
详细信息
After a general introduction of the VIKING EU FP7 project two specific cyber-attack mechanisms, which have been analyzed in the VIKING project, will be discussed in more detail. Firstly an attack and its consequences on the automatic Generation control (AGC) in a power system are investigated, and secondly the cyber security of State Estimators in SCADA systems is scrutinized.
暂无评论