Evolution of agents’ dynamics of multiagent systems under consensus protocol in the face of jamming attacks is discussed, where centralized parties are able to influence the control signals of the agents. In this pap...
Evolution of agents’ dynamics of multiagent systems under consensus protocol in the face of jamming attacks is discussed, where centralized parties are able to influence the control signals of the agents. In this paper we focus on a game-theoretical approach of multiagent systems where the players have incomplete information on their opponents’ strength. We consider repeated games with both simultaneous and sequential player actions where players update their beliefs of each other over time. The effect of the players’ optimal strategies according to Bayesian Nash Equilibrium and Perfect Bayesian Equilibrium on agents’ consensus is examined. It is shown that an attacker with incomplete knowledge may fail to prevent consensus despite having sufficient resources to do so.
This paper proposes PredictiveSLAM, a novel extension to ORB-SLAM2, which extracts features from specific regions of interest (ROI). The proposed method was designed with the risk posed both to humans and robotic syst...
This paper proposes PredictiveSLAM, a novel extension to ORB-SLAM2, which extracts features from specific regions of interest (ROI). The proposed method was designed with the risk posed both to humans and robotic systems in large-scale industrial sites in mind. The ROI are determined through an object detection network trained to detect moving human beings. The method detects and removes humans from feature extraction, predicting their potential future trajectory. This is done by omitting a specific ROI from extraction, deemed to be occluded in consecutive time steps. Two masking methods -static object and moving object trajectories - are proposed. This approach improves tracking accuracy and the performance of SLAM by removing the dynamic features from the reference for tracking and loop closures. The method is tested on data collected in a laboratory environment and compared against a state-of-the-art ground truth system. The validation data was collected from real-time experiments which aimed at simulating the typical human worker behaviours in industrial environments using an unmanned aerial vehicle (UAV). This study illustrates the advantages of the proposed method over earlier approaches, even with a highly dynamic camera setup on a UAV working in challenging environments.
Two-axis gimbals are used in stabilizing and controlling the aiming of optical systems. The main task is to isolate the angular motion of the payload and the disturbances affecting the optical axis of the camera while...
Two-axis gimbals are used in stabilizing and controlling the aiming of optical systems. The main task is to isolate the angular motion of the payload and the disturbances affecting the optical axis of the camera while maintaining the camera’s orientation locked onto the target. Currently, two commonly used gimbal structures are the Yaw-Pitch type and the Roll-Swing type. In this paper, we delve into an in-depth study to develop the full mathematical models for both types, thereby analyzing and evaluating the influence of the cross-channel noise moment effects caused by gimbal imbalance on the stability and aiming control quality under complex angular motion conditions of the payload. Simulation results conducted using MATLAB/SIMULINK with the two-axis gimbal model demonstrate that employing a robust control system significantly reduces the impact of disturbances and enhances the quality of control and stability of the transmission system.
Three-dimensional (3D) reconstruction serves as a cornerstone in various robotic applications, playing critical roles in scene understanding and navigation. Traditionally, LiDAR has been instrumental in generating pre...
详细信息
ISBN:
(数字)9798331508494
ISBN:
(纸本)9798331508500
Three-dimensional (3D) reconstruction serves as a cornerstone in various robotic applications, playing critical roles in scene understanding and navigation. Traditionally, LiDAR has been instrumental in generating precise point clouds of the environment, providing essential data for these applications. However, the efficacy of LiDAR sensors is significantly hindered in challenging conditions, such as the presence of water or icy surfaces. The complex interplay between laser beams and icy or non-ideal surfaces can result in signal degradation, distortion, or even complete signal loss, adversely affecting the accuracy and reliability of the 3D reconstruction process. The reflective and refractive properties of ice, along with its variable surface conditions, present challenges that traditional LiDAR sensors struggle to address. This paper proposes a diverse dataset to facilitate a multimodal approach for reconstructing icy surfaces using various sensors. A preliminary study based on this dataset demonstrates the feasibility of combining the geometric surface obtained from consecutive LiDAR scans with reconstructed meshes from visual cameras. The integration of distinct data sources has the potential to improve the robustness of reconstruction algorithms in diverse scenarios. The dataset can be downloaded at https://***/records/13862009.
In real-world scenarios, the impacts of decisions may not manifest immediately. Taking these delays into account facilitates accurate assessment and management of risk in real-world environments, thereby ensuring the ...
详细信息
Recent years have witnessed evolution of home energy management systems (HEMS) that allow end-use energy consumers to adjust their consumption in response to the needs of the wider energy infrastructure. In the contex...
Recent years have witnessed evolution of home energy management systems (HEMS) that allow end-use energy consumers to adjust their consumption in response to the needs of the wider energy infrastructure. In the context of electricity networks, this has lead to algorithm development for electricity cost reduction and grid support provision by load shifting or load curtailment or other load control. Such algorithms require models of appliance power profiles; a common approach is to approximate the power profile of an appliance by its rated or average power. However, the actual consumption patterns of any appliance may vary continuously during its operation. This paper presents a model that improves upon the existing state-of-art by introducing the notion of cycle of operation with power consumption varying across cycles. The paper also describes how such models can be incorporated into HEMS algorithms for cost-and-comfort optimization. Results demonstrating the reduction in cost and peak load as well as improvement in the total load profile are presented to demonstrate the usefulness of such representations.
The article is devoted to the use of mathematical models of the dynamics of heterogeneous populations, and computer simulation based on the above models allows to identify general trends in subpopulations, predict the...
详细信息
This study presents the conflict-aware multi-agent estimated time of arrival (CAMETA) framework, a novel approach for predicting the arrival times of multiple agents in unstructured environments without predefined roa...
This study presents the conflict-aware multi-agent estimated time of arrival (CAMETA) framework, a novel approach for predicting the arrival times of multiple agents in unstructured environments without predefined road infrastructure. The CAMETA framework consists of three components: a path planning layer generating potential path suggestions, a multi-agent ETA prediction layer predicting the arrival times for all agents based on the paths, and lastly, a path selection layer that calculates the accumulated cost and selects the best path. The novelty of the CAMETA framework lies in the heterogeneous map representation and the heterogeneous graph neural network architecture. As a result of the proposed novel structure, CAMETA improves the generalization capability compared to the state-of-the-art methods that rely on structured road infrastructure and historical data. The simulation results demonstrate the efficiency and efficacy of the multi-agent ETA prediction layer, with a mean average percentage error improvement of 29.5% and 44% when compared to a traditional path planning method (A *) which does not consider conflicts. The performance of the CAMETA framework shows significant improvements in terms of robustness to noise and conflicts as well as determining proficient routes compared to state-of-the-art multi-agent path planners.
The effect of relative entropy asymmetry is analyzed in the context of empirical risk minimization (ERM) with relative entropy regularization (ERM-RER). Two regularizations are considered: (a) the relative entropy of ...
详细信息
Distributed power allocation (DPA) in micro-grids (MGs) has a significant potential for attaining a cost effective and reliable solution of power dispatch. Considering the significant risks posed by cyber-attacks and ...
详细信息
ISBN:
(数字)9798350340266
ISBN:
(纸本)9798350340273
Distributed power allocation (DPA) in micro-grids (MGs) has a significant potential for attaining a cost effective and reliable solution of power dispatch. Considering the significant risks posed by cyber-attacks and system limitations to the MGs, it is important to develop resilient methods for an efficient DPA, which is valuable both in terms of theoretical understanding and practical application for energy 5.0 framework. This work addresses the DPA problem in MGs, specifically focusing on the economic dispatch (ED) for the generation side while taking into account ramp-rate limits (RRLs) and stochastic false-data injection (FDI) attacks. A consensus-based protocol has been developed by considering the information of the incremental costs of neighbouring generators and local power mismatch for a generation facility. A stochastic FDI attack at the shared information over the network has been accounted. The proposed technique guarantees robust (and resilient) convergence by providing a sufficient criterion under RRLs and stochastic FDI attacks. The proposed approach is based of the distributed ED framework, and convergence analysis has been performed via two Lyapunov functions. The convergence of total power mismatch and error in synchronization of incremental costs to bounded sets are ensured by the proposed approach. The presented framework achieves an efficient energy production cost. The network's robustness and resilience for the shared information of incremental cost of energy production units as the consensus variable are accounted. The simulation study for a set of five generators under stochastic FDI attacks and RRLs are provided which confirm the theoretical findings of the proposed scheme.
暂无评论