Changes in coal seam hardness cause fluctuations in the feed resistance at the drill bit during the drilling process, leading to unstable feeding speed. This paper proposes a robust dynamic output feedback controller ...
详细信息
The problems associated with the operation of overhead power lines and ways of improving control over their condition with the help of UAVs are considered. A structural diagram of the system of technical diagnostics o...
详细信息
Longitudinal and lateral motion planning poses a significant challenge to achieving full autonomy in automated vehicles. This work focuses on studying the motion planning problem for automated vehicles specifically in...
Longitudinal and lateral motion planning poses a significant challenge to achieving full autonomy in automated vehicles. This work focuses on studying the motion planning problem for automated vehicles specifically in a highwaymerging scenario. The problem is modeled as an infinite horizon optimal control problem, taking into account finite control sets for the ego agents and uncontrolled state components of surrounding traffic. For this type of control problem, obtaining a real-time solution that meets both high safety and efficiency requirements can be difficult. In this study, we employ the rollout approach, which involves online optimization following the simulation of a known baseline policy instead of relying solely on extensive offline training. We compare the performance of one and multistep lookahead rollout algorithms against several state-of-the-art benchmark policies in simulation. The simulation results indicate that the rollout algorithm significantly enhances safety while simultaneously maintaining a high average speed within the merging scenario. Furthermore, we conduct simulation studies to assess the rollout methods in adapting to varying behaviors of surrounding vehicles. Additionally, we investigate the impact of different horizon settings and the introduction of terminal cost approximation.
This paper addresses the coordination challenge at intersections of mixed traffic involving both Human-Driven Vehicles (HDVs) and Connected and Autonomous Vehicles (CAVs). To strike a balance between coordination perf...
This paper addresses the coordination challenge at intersections of mixed traffic involving both Human-Driven Vehicles (HDVs) and Connected and Autonomous Vehicles (CAVs). To strike a balance between coordination performance and safety guarantees, we propose an invariant safe Contingency Model Predictive control (CMPC) framework. The CMPC framework incorporates two parallel horizons for the ego vehicle: a nominal horizon optimized for performance based on the most likely prediction of the opponent HDV, and a contingency horizon designed to maintain an invariant safe backup plan for emergencies. In the contingency horizon, we consider the worst-case behavior of the human driver and formulate safety constraints using the forward reachable sets of the HDV within the planning horizon. These safety constraints are complemented by maximal invariant safe sets as terminal constraints. The two horizons are tied together by enforcing equality of the feedback inputs at the beginning of the horizons. We provide theoretical evidence supporting the recursive feasibility and persistent performance improvement of the invariant safe CMPC compared to our previously proposed nominal invariant safe Model Predictive control (MPC). Through simulation studies, we evaluate the proposed method. The simulation results demonstrate that the CMPC approach achieves enhanced performance by reducing conservatism while simultaneously preserving the invariant safety property.
Driven by ubiquitous digitalization and cyberattacks on critical infrastructure, there is a high interest in research on the security of cyber-physical systems. If an attacker gains access to protected and sensitive i...
详细信息
ISBN:
(数字)9798350316339
ISBN:
(纸本)9798350316346
Driven by ubiquitous digitalization and cyberattacks on critical infrastructure, there is a high interest in research on the security of cyber-physical systems. If an attacker gains access to protected and sensitive information, such as the internal states of a control system, this is considered a breach of confidentiality. Access to sensitive information can be the first step in a larger cyber-attack scheme, such as a stealthy false data injection attack. Considering process and measurement noise in the plant, existing research investigated when an attacker equipped with a Kalman filter can perfectly estimate the internal controller states if the attacker has access to plant measurements and all model parameters. For this estimate to converge, the controller is required to have stable poles. In this paper, we show that if the attacker has access to the control inputs instead of the plant measurements, the controller needs to have stable zeros. Additionally, we demonstrate that an attacker equipped with an Unknown Input Observer, using tools from delayed system inversion, can get a delayed yet perfect estimate of the controller states from the control inputs without knowledge of the plant’s parameters and noise characteristics. Lastly, we present simulation results from a three-tank system to showcase the differences in controller state estimation.
Image geo-localization estimates an image's global position by comparing it with a large-scale image database containing known positions. This localization technology can serve as an alternative positioning method...
详细信息
This paper presents a lightweight AXI DMA controller architecture useful for embedded systems that do not require fully featured DMA controllers. Simulation is accomplished with VUnit, and implementation results are o...
This paper presents a lightweight AXI DMA controller architecture useful for embedded systems that do not require fully featured DMA controllers. Simulation is accomplished with VUnit, and implementation results are obtained on a Xilinx XC7Z010CLG400-1 FPGA. When compared with Xilinx's AXI DMA controller with the same configuration, the presented controller utilizes between 16 and 82% fewer resources with comparable speed.
Lyapunov functions are a widely used tool to evaluate stability properties of nonlinear dynamical systems’ equilibria. In this paper quantifier elimination is used to construct Lyapunov functions for polynomial syste...
详细信息
We present Self-Tuning Tube-based Model Predictive control (STT-MPC), an adaptive robust control algorithm for uncertain linear systems with additive disturbances based on the least-squares estimator and polytopic tub...
We present Self-Tuning Tube-based Model Predictive control (STT-MPC), an adaptive robust control algorithm for uncertain linear systems with additive disturbances based on the least-squares estimator and polytopic tubes. Our algorithm leverages concentration results to bound the system uncertainty set with prescribed confidence, and guarantees robust constraint satisfaction for this set, along with recursive feasibility and input-to-state stability. Persistence of excitation is ensured without compromising the algorithm’s asymptotic performance or increasing its computational complexity. We demonstrate the performance of our algorithm using numerical experiments.
Both fixed-gain control and adaptive learning architectures aim to mitigate the effects of uncertainties. In particular, fixed-gain control offers more predictable closed-loop system behavior but requires the knowledg...
详细信息
暂无评论