This work considers the localizability of multi-agent systems based on local bearing measurement.A novel prescribedtime orientation estimation algorithm is first proposed to guarantee that the local reference frame of...
详细信息
ISBN:
(数字)9789887581581
ISBN:
(纸本)9798350366907
This work considers the localizability of multi-agent systems based on local bearing measurement.A novel prescribedtime orientation estimation algorithm is first proposed to guarantee that the local reference frame of the follower agent is aligned with the global *** orientation estimation algorithm is then applied to the problem of position estimation,and a prescribedtime distributed localization estimation algorithm is *** global convergence is derived based on the cascade *** simulation results are provided to prove the effectiveness of the proposed estimation methods.
Human societies and natural environments form a complex ecological system,in which human activities can change the ecological environment,the changes in the ecological environment can influence human social activities...
详细信息
ISBN:
(数字)9789887581581
ISBN:
(纸本)9798350366907
Human societies and natural environments form a complex ecological system,in which human activities can change the ecological environment,the changes in the ecological environment can influence human social activities in *** paper introduces a punitive mechanism as environmental feedback into co-evolutionary systems,and proposes a replicator dynamic model which aims to explain the evolutionary strategies adopted by populations for the multiplayer snowdrift *** obtain the necessary and sufficient condition for the existence and stability of the internal equilibrium point by studying on the Jacobian matrix,and the effectiveness of the theoretical results is examined by numerical *** identify that the threshold parameter in multiplayer snowdrift games determines the evolution of the closed-loop ***,the system exhibits limit cycles when the threshold is small *** the threshold increases,the system converges to a stable internal equilibrium ***,if the threshold reaches a sufficiently large value,the proportion of cooperators in the population is high,while the group of punishers becomes extinct,indicating the loss of environmental feedback.
Vision-based formation control offers an alternate solution for unmanned aerial vehicles (UAVs) to work together in the external position system denied environment. In this paper, we present a vision-based formation c...
详细信息
A trajectory-tracking problem for a vision-based quadrotor control system is investigated in this paper. A super twisting sliding mode (STSM) controller is proposed for finite-time trajectory tracking control. With th...
详细信息
In this paper, a unified influence networks model incorporating differential privacy mechanisms (DPMs), called the differentially private opinion dynamics (DPODs) model is proposed. In this model, each individual uses...
详细信息
This research article considers the design of static output-feedback sliding mode control for Markovian jump systems,in which the attacker may inject false information into the communication channel between the contro...
详细信息
ISBN:
(纸本)9781665431293
This research article considers the design of static output-feedback sliding mode control for Markovian jump systems,in which the attacker may inject false information into the communication channel between the controller and the *** key issue is how to design the feasible sliding mode control law to overcome the effects of unknown and time-varying *** this end,an on-line estimation scheme is introduced to deal with the unknown network attack *** then,a linear sliding surface is constructed based on the measured output information and an outputfeedback sliding mode controller is correspondingly *** is shown that the reachability of the specified sliding surface can be achieved and the asymptotic stability of the closed-loop system can be ensured under the derived sufficient ***,simulation examples are provided to verify the developed static output-feedback sliding mode control strategy.
In this paper, we study the privacy preservation problem in a cooperative networked control system working for the task of LQG control. The system consists of a user and a server: the user owns the state process, the ...
详细信息
Deep learning has revolutionized the field of artificial intelligence. Based on the statistical correlations uncovered by deep learning-based methods, computer vision has contributed to tremendous growth in areas like...
详细信息
Depth information is important for autonomous systems to perceive environments and estimate their own state. Traditional depth estimation methods, like structure from motion and stereo vision matching, are built on fe...
详细信息
Depth information is important for autonomous systems to perceive environments and estimate their own state. Traditional depth estimation methods, like structure from motion and stereo vision matching, are built on feature correspondences of multiple viewpoints. Meanwhile, the predicted depth maps are sparse. Inferring depth information from a single image(monocular depth estimation) is an ill-posed problem. With the rapid development of deep neural networks, monocular depth estimation based on deep learning has been widely studied recently and achieved promising performance in accuracy. Meanwhile, dense depth maps are estimated from single images by deep neural networks in an end-to-end manner. In order to improve the accuracy of depth estimation, different kinds of network frameworks, loss functions and training strategies are proposed subsequently. Therefore, we survey the current monocular depth estimation methods based on deep learning in this review. Initially, we conclude several widely used datasets and evaluation indicators in deep learning-based depth estimation. Furthermore, we review some representative existing methods according to different training manners: supervised, unsupervised and semi-supervised. Finally, we discuss the challenges and provide some ideas for future researches in monocular depth estimation.
Cyber attacks pose severe threats on synchronization of multi-agent *** attack,as a typical type of cyber attack,can bypass the surveillance of the attack detection mechanism silently,resulting in a heavy ***,the prob...
详细信息
Cyber attacks pose severe threats on synchronization of multi-agent *** attack,as a typical type of cyber attack,can bypass the surveillance of the attack detection mechanism silently,resulting in a heavy ***,the problem of mean-square bounded synchronization in multi-agent systems subject to deception attacks is investigated in this *** control signals can be replaced with false data from controllerto-actuator channels or the *** success of the attack is measured through a stochastic variable.A distributed impulsive controller using a pinning strategy is redesigned,which ensures that mean-square bounded synchronization is achieved in the presence of deception *** sufficient conditions are derived,in which upper bounds of the synchronization error are ***,two numerical simulations with symmetric and asymmetric network topologies are given to illustrate the theoretical results.
暂无评论