Distributed Consensus Control for Second-Order Stochastic Nonlinear Multiagent Systems Using Command Filter Backstepping

Author(s):  
Guozeng Cui ◽  
Jinpeng Yu ◽  
Gongfei Song
2013 ◽  
Vol 2013 ◽  
pp. 1-9 ◽  
Author(s):  
Jiangping Hu ◽  
Yulong Zhou ◽  
Yunsong Lin

Event-driven control scheduling strategies for multiagent systems play a key role in future use of embedded microprocessors of limited resources that gather information and actuate the agent control updates. In this paper, a distributed event-driven consensus problem is considered for a multi-agent system with second-order dynamics. Firstly, two kinds of event-driven control laws are, respectively, designed for both leaderless and leader-follower systems. Then, the input-to-state stability of the closed-loop multi-agent system with the proposed event-driven consensus control is analyzed and the bound of the inter-event times is ensured. Finally, some numerical examples are presented to validate the proposed event-driven consensus control.


2014 ◽  
Vol 2014 ◽  
pp. 1-11 ◽  
Author(s):  
Guoguang Wen ◽  
Yongguang Yu ◽  
Zhaoxia Peng ◽  
Ahmed Rahmani

This paper mainly addresses the distributed consensus tracking problem for second-order nonlinear multiagent systems with a specified reference trajectory. The dynamics of each follower consists of two terms: nonlinear inherent dynamics and a simple communication protocol relying only on the position and velocity information of its neighbors. The consensus reference is taken as a virtual leader, whose output is only its position and velocity information that is available to only a subset of a group of followers. To achieve consensus tracking, a class of nonsmooth control protocols is proposed which reply on the relative information among the neighboring agents. Then some corresponding sufficient conditions are derived. It is shown that if the communication graph associated with the virtual leader and followers is connected at each time instant, the consensus can be achieved at least globally exponentially with the proposed protocol. Rigorous proofs are given by using graph theory, matrix theory, and Lyapunov theory. Finally, numerical examples are presented to illustrate the theoretical analysis.


2018 ◽  
Vol 5 (4) ◽  
pp. 1585-1596 ◽  
Author(s):  
Huihui Ji ◽  
Hai-Tao Zhang ◽  
Zhiyong Ye ◽  
He Zhang ◽  
Bowen Xu ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document