- document
-
Boldrer, M. (author), Lyons, L. (author), Palopoli, Luigi (author), Fontanelli, Daniele (author), Ferranti, L. (author)This letter proposes a distributed strategy to achieve both persistent monitoring and target detection in a rectangular and obstacle-free environment. Each robot has to repeatedly follow a smooth trajectory and avoid collisions with other robots. To achieve this goal, we rely on the time-inverted Kuramoto dynamics and the use of Lissajous...journal article 2023
- document
-
Yue, Dongdong (author), Baldi, S. (author), Cao, Jinde (author)We revisit distributed sampled-data consensus problems from a scalability point of view. Existing solutions in the literature for estimating the maximum sampling interval that preserves stability rely on the Lyapunov functional method. With this method, the overall closed-loop system (i.e. the overall network of agents) is treated as a time...journal article 2023
- document
-
Lv, Maolong (author), De Schutter, B.H.K. (author), Shi, Chao (author), Baldi, S. (author)This work studies logic-based distributed switching control for nonlinear agents in power-chained form, where logic-based (switching) control arises from the online estimation of the control directions assumed to be unknown for all agents. Compared to the state-of-the-art logic-based mechanisms, the challenge of power-chained dynamics is that...journal article 2022
- document
-
Boldrer, M. (author), Palopoli, Luigi (author), Fontanelli, Daniele (author)Different authors have addressed a number of problems in the area of distributed control proposing convincing solutions to specific problems such as static coverage, dynamic coverage/exploration, rendezvous, flocking, formation control. However, a major limitation of problem-specific approaches is a fundamental lack of flexibility when the...journal article 2022
- document
-
Maestre, José M. (author), Velarde, Pablo (author), Ishii, Hideaki (author), Negenborn, R.R. (author)In this paper, we present an analysis of the vulnerability of a distributed model predictive control (DMPC) scheme in the context of cyber-security. We consider different types of the so-called insider attacks. In particular, we consider the situation where one of the local controllers sends false information to others to manipulate costs for...journal article 2021
- document
-
Valk, Laurens (author), Keviczky, T. (author)We show how passivity-based control by interconnection and damping assignment (IDA-PBC) can be used as a design procedure to derive distributed control laws for undirected connected networks of underactuated and fully-actuated heterogeneous mechanical systems. With or without leaders, agents are able to reach a stationary formation in the...journal article 2018