Next Article in Journal
Complete Path Planning for a Tetris-Inspired Self-Reconfigurable Robot by the Genetic Algorithm of the Traveling Salesman Problem
Next Article in Special Issue
H Consensus Control for Heterogeneous Multi-Agent via Output under Markov Switching Topologies
Previous Article in Journal
Evolution of Wireless Sensor Network for Air Quality Measurements
Previous Article in Special Issue
A Nonlinearly Modulated Logistic Map with Delay for Image Encryption
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Event-Triggered Containment Control of Multi-Agent Systems With High-Order Dynamics and Input Delay

School of Electronics and Information, Jiangsu University of Science and Technology, Zhenjiang 212003, China
*
Author to whom correspondence should be addressed.
Electronics 2018, 7(12), 343; https://doi.org/10.3390/electronics7120343
Submission received: 1 October 2018 / Revised: 5 November 2018 / Accepted: 19 November 2018 / Published: 22 November 2018
(This article belongs to the Special Issue Recent Developments on Time-Delay Systems and Its Applications)

Abstract

:
This paper studies the problem of distributed containment control for multi-agent systems with high-order dynamics and input delays. Two event-triggered control algorithms are proposed for multi-agent systems without and with input delay, respectively. The communication instants between two linked followers are determined by the event-triggering condition, and every follower can detect the event based on its own control input. For the followers, edge-based estimators are adopted to predict state differences to neighbors. Control inputs of the followers are calculated based on the predicted values of the state differences. To deal with the input delay, a delay comprehension approach is developed. It is proved that for arbitrarily large but bounded input delays, the followers can move into the convex hull spanned by the leaders asymptotically. Simulation results show the effectiveness of the proposed algorithms.

1. Introduction

Distributed cooperative control of multi-agent systems has been studied extensively in the past decade. Compared with its centralized counterpart, distributed control has many advantages such as low cost, easy maintenance, and high adaptivity. As a fundamental problem in distributed cooperative control, the consensus problem has attracted much attention. For a group of agents, consensus means reaching an agreement on a quantity of interest. The consensus problem can be classified into leaderless consensus and leader-following consensus, according to the absence or presence of a leader. Recently, much progress has been made on both leaderless and leader-following consensus problems (see [1,2,3,4,5] and references therein).
Although the leader-following consensus problem for multi-agent systems with single leader is interesting, it is sometimes more meaningful to study the leader-following problem for multi-agent systems with multiple leaders. This problem is called the containment problem, the objective of which is to steer all the followers into the convex hull spanned by the leaders. In recent years, researchers have paid much attention to the containment control problem owing to its wide applications in swarm robotics [6,7,8,9,10,11,12,13,14,15,16]. In [17], the containment control problem is investigated in both continuous-time and discrete-time domain. A P I n -Type containment control algorithm is proposed, which allows the followers to be of any-order integral dynamics.
In the aforementioned results, it is assumed that the agents can access their neighbors’ states continuously or with a fixed frequency. This is unnecessary or unrealistic in many applications. On one hand, it is a waste of communication resource to access the neighbors’ states frequently when the system states nearly approach their equilibriums or there are no disturbances imposed on the system [18,19,20]. On the other hand, too much communication may lead to rising power costs and network congestion, which may degrade the performance of the system [21,22,23]. The event-triggered control is a good strategy to solve this problem [24,25,26]. Compared with the traditional sampled-data-based control, where the measurement or control is triggered by time, the main feature of the event-triggered control is that the measurement or control action is triggered by an event condition. The event-triggered control strategy was applied in both leaderless and leader-following consensus problems for multi-agent systems in [27,28,29]. For more details, one can refer to [30] and references therein. More recently, the authors in [31,32,33] have proposed some event-triggered containment control algorithms for multi-agent systems with multiple leaders.
Time-delay exists in most practical systems. So, it is very meaningful to investigate the stability of time-delay systems [34,35,36,37,38,39,40]. For multi-agent systems, the effect of time-delay is also an important problem to be considered. There are two sources of time-delay in multi-agent systems. One source is the communication among agents, which is called communication delays. The other source is the processing time for the information arrived at each agent, which is called input delays. The consensus problem for multi-agent system with communication/input delays has been extensively investigated in the literature (see [41] and references therein). For second-order multi-agent systems with time-varying delays, the containment control problem is considered in [42]. Recently, Miao et al. addressed the containment problem for second-order multi-agent systems with constant input delays [43]. An event-triggered containment control algorithm was proposed, together with conditions under which the followers will converge to the convex hull spanned by the leaders.
In this paper, we consider the event-triggered containment control problem for multi-agent systems with high-order dynamics and input delay. Motivated by [29], model-based approach is developed to avoid continuous communications among followers, and edge-based estimators are designed to predict state differences to neighbors. New event-triggered containment control algorithms are proposed for multi-agent systems without and with input delay, respectively. Sufficient conditions are derived under which the followers will move into the convex hull formed by the leaders. Compared with existing literatures on the containment control problem for multi-agent systems, our contribution is summarized as follows.
  • A delay compensation-based event-triggered containment controller is developed. It is proved that for arbitrarily large but bounded constant input delays, the proposed controller can drive all the followers into the convex hull formed by the leaders. In contrast, the controller in [43] can deal with input delays below an upper bound only.
  • The proposed algorithms are distributed, while the algorithms in [31,32,33,43] are centralized. Using the algorithms proposed in this paper, every follower can decide whether the event should be triggered based on its own control input. However, using algorithms in [31,32,33,43], all agents need their neighbors’ states to trigger the next communication.
  • Compared with the containment control algorithms with continuous [6,7,8,9,10,11,12,13,14,15,16] or periodic communications [17], the proposed event-triggered containment control algorithms has the potential to reduce the communication burden of multi-agent systems.
Notations: Throughout this paper, R l denotes the l dimensional Euclidean space, 0 p × q denotes a p × q matrix with all the elements to be zero. Given a vector μ , μ denotes the Euclidean norm of μ . Given a matrix A, A > 0 means that A is a positive definite matrix, A is the induced norm of A. The superscript T denotes the transpose of a vector or matrix. We use diag ( μ 1 , , μ p ) to denotes the diagonal matrix of all μ 1 , ⋯, μ p .

2. Problem Formulation

2.1. Algebraic Graph Theory

Consider a group of agents consisted of M leaders and N followers. The leaders do not need to access information from the followers, while the followers are guided by the leaders. We assume that only a part of the followers can access information from some leaders. These followers are called informed followers. The rest of the followers cannot receive information from the leaders directly.
We use graph G = ( V , E ) to denote the communication topology among the leaders and the followers, where V = { 1 , , M + N } is the node set and E V × V is the edge set. A directed edge ( j , i ) E denotes that node i can receive information from node j but not necessarily vice versa. An undirected edge ( j , i ) E denotes that node i and node j can access information from each other. A graph is undirected if all the edges in the graph are undirected. The neighbor set N i = { j ( j , i ) E } denotes the set of nodes from which node i can access information. A directed path is a sequence of directed edges of the form ( i 1 , i 2 ) , ( i 2 , i 3 ) ,..., where i j V .
The adjacency matrix A d = [ a i j ] R ( M + N ) × ( M + N ) is defined as a i j > 0 if ( j , i ) E and a i j = 0 otherwise. The Laplacian matrix L = [ l i j ] R ( M + N ) × ( M + N ) is defined as l i i = j = 1 , j i M + N a i j and l i j = a i j , i j . We use L = { 1 , 2 , , M } and F = { M + 1 , M + 2 , , M + N } to denote node set of the leaders and the followers, respectively. Notice that a i j = 0 for all i = 1 , , M and j = 1 , , M + N , because the leaders have no neighbors. Therefore, the Laplacian matrix L can be rewritten as
L = 0 M × M 0 M × N L 1 L 2 .
In this paper, for the sake of convenience, we assume that a i j = 1 , if ( j , i ) E .

2.2. System Models and Control Objectives

Consider a network of M leaders and N followers with the following linear dynamics:
x ˙ i ( t ) = A x i ( t ) , i L ,
x ˙ i ( t ) = A x i ( t ) + B u i ( t ) , i F ,
where x i ( t ) R n and u i ( t ) R m are the state and the control input of agent i, respectively; A and B are constant matrices with appropriate dimensions.
When there exists a constant input delay τ , (3) becomes
x ˙ i ( t ) = A x i ( t ) + B u i ( t τ ) , i F .
Definition 1.
Let C = R p . The set C is said to be convex if for any x and y in C , the point ( 1 α ) x + α y is in C for any α [ 0 , 1 ] . The convex hull Co ( X ) of a set of points X = { x 1 , , x q } is the minimal convex set containing all points in X.
Definition 2.
We say algorithm u i ( t ) asymptotically solves the containment problem if, under algorithm u i ( t ) , the followers move into the convex hull formed by the leaders asymptotically.
The following assumptions and lemmas are used later.
Assumption 1.
The communication graph among the followers is undirected. For each follower, there exists at least one leader that has a path to it.
Lemma 1
([13]).Under assumption 1, the matrix L 2 defined in (1) is symmetric positive definite.
From Lemma 1 we have all the eigenvalues of L 2 are positive. Assume that the eigenvalues of L 2 are λ 1 λ 2 λ N .
Lemma 2.
Each entry of L 2 1 L 1 is nonnegative and each row sum of L 2 1 L 1 is equal to one.
Lemma 3.
Assume that the matrix pair ( A , B ) is controllable, and all the poles of A are on the imaginary axis. For any constant scalar γ > 0 , the parametric Riccati equation
A T P + P A P B B T P = γ P
has a unique positive definite matrix P ( γ ) = W 1 ( γ ) , where W ( γ ) is the unique positive definite solution to the following Lyapunov equation W ( A + γ 2 I n ) T + ( A + γ 2 I n ) W = B B T . Moreover, lim γ 0 + P ( γ ) = 0 , d d γ P ( γ ) > 0 , γ > 0 , t r ( B T P ( γ ) B ) = n γ , P ( γ ) B B T P ( γ ) n γ P ( γ ) , e A t P ( γ ) e A t e ( n 1 ) γ t P ( γ ) . Moreover, if all the eigenvalues of A are zero, then A T P ( γ ) A 3 ( n γ ) 2 P ( γ ) .

2.3. Event-Triggered Communication Mechanisms

As will be explained later, since control inputs of the leaders are zero, the informed followers can estimate states of the leaders based on their initial states. Therefore, the event-triggered mechanism is not needed for the communication between the leaders and the informed followers.
Assume that followers i and j are two linked agents, and they exchange information at event instants { t i j 0 , t i j 1 , t i j k } . To exchange information based on the event-triggering communication mechanism, event trigging functions f i j ( t ) and f j i ( t ) should be designed for each edge ( j , i ) . The event instants between followers i and j are determined according to
t i j k + 1 = t j i k + 1 = inf { t t > t i j k , f i j ( t ) 0 o r f j i ( t ) 0 } , j N i
where t i j 0 = t j i 0 = 0 . Once f i j ( t ) reaches zero, an event is triggered. Follower i will send x i ( t ) to follower j, and then receive x j ( t ) from follower j. Conversely, if f j i ( t ) reach zero first, follower j will send x j ( t ) to follower i, and then receive x i ( t ) from follower i.
The objective of this paper is to design the event-triggering functions and the control algorithms for system (2) and (3) without input delay, and the input delay system (2) and (4), respectively, such that all the followers can move to the convex hull formed by the leaders.

3. Event-Triggered Containment Control without Input Delay

In this section, we consider the containment control problem without input delay. Define x F ( t ) = x M + 1 T ( t ) , , x M + N T ( t ) T , and x L ( t ) = x 1 T ( t ) , , x M T ( t ) T . Note from Lemma 2 that if
x F ( t ) = ( L 2 1 L 1 I n ) x L ( t ) ,
then all the followers are in the convex hull formed by the leaders. For follower i, define
φ i ( t ) = j L F a i j [ x i ( t ) x j ( t ) ] .
If φ i ( t ) = 0 for i = M + 1 , , M + N , one has
( L 2 I n ) x F ( t ) + ( L 1 I n ) x L ( t ) = 0 ,
which implies that (7) holds. Therefore, all the followers lie in the convex hull formed by the leaders if φ i ( t ) = 0 holds for i = M + 1 , , M + N .
Let e i j ( t ) = x i ( t ) x j ( t ) be the state difference between follower i and leader j, and z i j ( t ) = x i ( t ) x j ( t ) be the state difference between followers i and j. Equation (8) can be rewritten as
φ i ( t ) = j L a i j e i j ( t ) + j F a i j z i j ( t ) , i = M + 1 , , M + N .
For informed followers, to drive φ i ( t ) to zero, e i j ( t ) and z i j ( t ) are needed. For other followers, z i j ( t ) is needed. However, when the event-triggering communication mechanism is adopted, such information is available only at the event instants. To solve this problem, we need the following state difference estimators to estimate e i j ( t ) and z i j ( t ) during the inter-event intervals.

3.1. Leader Edge State Difference Estimators

Suppose that informed follower i can access leader j’s state. In this case, edge ( j , i ) is called leader edge of follower i. From (2) and (3) and the definition of e i j ( t ) we have
e ˙ i j ( t ) = A e i j ( t ) + B u i ( t ) .
Follower i can construct the following estimator to estimate e i j ( t )
e ^ ˙ i j ( t ) = A e ^ i j ( t ) + B u i ( t ) ,
where e ^ i j ( 0 ) = e i j ( 0 ) = x i ( 0 ) x j ( 0 ) . The solution of (12) is
e i j ( t ) = e A t e i j ( 0 ) + 0 t e A ( t s ) B u i ( s ) d s .
Remark 1.
It is trivial to prove that e ^ i j ( t ) = e i j ( t ) , for all t > 0 . So, the informed followers can estimate e i j ( t ) based on the initial state x j ( 0 ) , i.e., they only need to communicate with the leaders one time. This is because the leaders’ control inputs are assumed to be zero. If the leaders’ control inputs are nonzero, the informed followers need to communicate with their leader neighbors frequently. Tracking dynamic leaders with an event-triggered controller is a tough problem, which will be considered in our future work.

3.2. Neighbor Edge State Difference Estimators

Suppose that follower i can access follower j’s state. In this case, edge ( j , i ) is called neighbor edge of follower i. From (3) we have
z ˙ i j ( t ) = A z i j ( t ) + B [ u i ( t ) u j ( t ) ] .
In the inter-event interval ( t i j k , t i j k + 1 ) , u j ( t ) is not available for follower i. Follower i can adopt the following estimator to estimate z i j ( t )
z ^ ˙ i j ( t ) = A z ^ i j ( t ) ,
where z ^ i j ( 0 ) = z i j ( 0 ) and z ^ i j ( t i j k ) = z i j ( t i j k ) . The solution of (15) in inter-event interval ( t i j k , t i j k + 1 ) is
z ^ i j ( t ) = e A ( t t i j k ) z i j ( t i j k ) .
Define z ˜ i j ( t ) = z ^ i j ( t ) z i j ( t ) . Notice that followers i can correcting z ^ i j ( t ) at the event instants. Therefore, z ˜ i j ( t ) = 0 at the event instants. Denote t i j t the last event instant of edge ( i , j ) before time t. If t is the event instant, then t i j t = t . From (14) and (15) we have
z ˜ ˙ i j ( t ) = A z ˜ i j ( t ) B [ u i ( t ) u j ( t ) ] .
It follows that
z ˜ i j ( t ) = t i j t t e A ( t s ) B [ u i ( s ) u j ( s ) ] d s .

3.3. Event-Triggering Functions

Same to [29], we use the following event trigging function for edge ( j , i )
f i j ( t ) = b ( t ) h i j ( t ) ,
where h i j ( t ) = t i j k t e A ( t s ) B u i ( s ) d s for t [ t i j k , t i j k + 1 ) , b ( t ) > 0 is a continuous threshold function. In the following of this paper, we set the threshold function as b ( t ) = α e c t , where α and c are constant positive scalars.
Remark 2.
Notice that h i j ( t ) and f i j ( t ) are not related to any information about other agents. So, follower i can detect the event dependently. In contrast, triggering functions in [31,32,33] are related to neighbors’ states. When these triggering functions are used, a centralized detector is needed.

3.4. Event-Triggered Containment Control Algorithms

Based on the aforementioned state difference estimators and event-triggering function, we consider the following containment control algorithm
u i ( t ) = K j L a i j e ^ i j ( t ) + j F a i j z ^ i j ( t ) = K j L a i j e i j ( t ) + j F a i j [ z i j ( t ) + z ˜ i j ( t ) ] = K [ φ i ( t ) + j F a i j z ˜ i j ( t ) ] = K [ φ i ( t ) + e i ( t ) ] , i = M + 1 , , M + N ,
where e i ( t ) = j F a i j z ˜ i j ( t ) , and K is a parametric matrix to be designed. The derivative of φ i ( t ) along the solution of (2) and (3) is
φ ˙ i ( t ) = j L F a i j [ x ˙ i ( t ) x ˙ j ( t ) ] = j L a i j [ A x i ( t ) + B u i ( t ) A x j ( t ) ] + j F a i j [ A x i ( t ) + B u i ( t ) A x j ( t ) B u j ( t ) ] = A φ i ( t ) + B j L a i j u i ( t ) + j F a i j [ u i ( t ) u j ( t ) ] = A φ i ( t ) + B K j L a i j [ φ i ( t ) + e i ( t ) ] + j F a i j [ φ i ( t ) + e i ( t ) φ j ( t ) e j ( t ) ] = A φ i ( t ) + B K j L a i j φ i ( t ) + j F a i j [ φ i ( t ) φ j ( t ) ] + B K j L F a i j e i ( t ) j F a i j e j ( t ) , i = M + 1 , , M + N .
Define φ ( t ) = φ M + 1 T ( t ) , , φ M + N T ( t ) T , e ˜ ( t ) = e M + 1 T ( t ) , , e M + N T ( t ) T . Equation (21) can be rewritten in a compact form as
φ ˙ ( t ) = A ¯ φ ( t ) + L 2 B K e ˜ ( t ) ,
where A ¯ = I n A + L 2 B K . From (6) , (17) and (18) we have
z ˜ i j ( t ) = t i j t t e A ( t s ) B [ u i ( s ) u j ( s ) ] d s t i j t t e A ( t s ) B u i ( s ) d s + t i j t t e A ( t s ) B u i ( s ) d s 2 b ( t ) = 2 α e c t .
It follows that
e i ( t ) = j F a i j z ˜ i j ( t ) ( N 1 ) z ˜ i j ( t ) 2 ( N 1 ) α e c t .
From (21) and (23) we have
φ ( t ) e A ¯ t φ ( 0 ) + 0 t e A ¯ ( t s ) L 2 B K e ˜ ( s ) d s e A ¯ t φ ( 0 ) + λ N 0 t e A ¯ ( t s ) B K e ˜ ( s ) d s e A ¯ t φ ( 0 ) + 2 α N λ N ( N 1 ) B K 0 t e A ¯ ( t s ) e c s d s ,
where λ N is the largest eigenvalue of L 2 .
The proposed containment control algorithm is summarized in Algorithm 1, where T is the lifespan of the system.
Algorithm 1 Event-Triggered Containment Control Algorithm for follower i: without input delay.
Initiation:
  • k 0 ;
  • for j L N i do
  •     receive x j ( 0 ) from leader j; e ^ i j ( 0 ) x i ( 0 ) x j ( 0 ) ;
  • end for
  • for j F N i do
  •     send x i ( 0 ) to follower j and receive x j ( 0 ) from follower j ;
  •  
  •      t i j k 0 ; e ^ i j ( 0 ) x i ( 0 ) x j ( 0 ) ; f i j ( 0 ) α ;
  •  
  • end for
  • compute the controller u i ( 0 ) as in (20);
Iteration:
  1:
while t < T do
  2:
    for j L N i do
  3:
        compute e ^ i j ( t ) as in (13);
  4:
    end for
  5:
    for j F N i do
  6:
        compute f i j ( t ) as in (18);
  7:
        if f i j ( t ) 0 then
  8:
           send x i ( t ) to follower j and receive x j ( t ) from follower j; t i j k t ;
  9:
        end if
 10:
        compute z ^ i j ( t ) as in (16);
 11:
    end for
 12:
    compute the controller u i ( t ) as in (20).
 13:
end while
Theorem 1.
Consider a network with M leaders (2) and N followers (3). Suppose that ( A , B ) is controllable, the communication graph satisfies Assumption 1, and the event-triggered communication mechanism is adopted with triggering function (18). Let K = B T P , where P is the solution of the following Riccati equality
A T P + P A 2 λ 1 P B B T P + a I = 0 ,
where λ 1 is the smallest eigenvalue of L 2 , a > 0 is a constant scalar. With control algorithm (20), all the followers will converge to the convex hull formed by the leaders.
Proof. 
Assume that the communication graph satisfied Assumption 1. From Lemma 1 we have λ 1 > 0 . Suppose that ( A , B ) is controllable. For any a > 0 , Riccati equality (27) has a solution P. Let K = B T P , then A ¯ in (25) is equal to I n A L 2 B B T P . Since L 2 is a symmetric positive definite matrix, we can find an orthogonal matrix U such that U 1 L 2 U = d i a g { λ 1 , , λ N } . It follows that ( U 1 I n ) A ¯ ( U I n ) = I n A d i a g { λ 1 , , λ N } B B T P , which implies that A ¯ = ( U 1 I n ) ( I n A d i a g { λ 1 , , λ N } B B T P ) ( U I n ) . It then follows that
e A ¯ t = ( U I n ) d i a g { e A λ 1 B B T P , , e A λ N B B T P } ( U 1 I n ) .
Because λ 1 λ 2 λ N , we have
A T P + P A 2 λ 1 P B B T P + a I 0 , i = 1 , , N .
By a similar process with Section 4 in [29] we can find positive scalars β and δ such that
e A ¯ t β e δ t .
From (25) and (27) we have
φ ( t ) β e δ t φ ( 0 ) + 2 α N λ N ( N 1 ) B K 0 t β e δ ( t s ) e c s d s β e δ t φ ( 0 ) + 2 α N λ N ( N 1 ) B K 0 t e ( δ c ) s d s β e δ t φ ( 0 ) + 2 α N λ N ( N 1 ) B K e ( δ c ) t 1 δ c .
Therefore, φ ( t ) converge to zero exponentially. Based on the analysis above we have that all the followers will converge to the convex hull formed by the leaders, which complete the proof. □
Next, we show that the Zeno behavior can be excluded by the control algorithm (20) and triggering function (8).
Theorem 2.
Suppose that 0 < c < δ . The inter-event intervals are lower bounded by
t i j k + 1 t i j k 1 A + c ln ( 1 + A + c θ B K ) ,
where θ = β φ ( 0 ) + 2 α β N λ N ( N 1 ) δ c + 2 ( N 1 ) α .
Proof. 
With control algorithm (20), from (23) and (29) we have
B u i ( t ) = B K [ φ i ( t ) + e i ( t ) ] B K ( φ i ( t ) + e i ( t ) ) B K [ η ( t ) + 2 ( N 1 ) α e c t ] ,
where η ( t ) = β e δ t φ ( 0 ) + 2 α N λ N ( N 1 ) B K e ( δ c ) t 1 δ c .
Suppose that 0 < c < δ . For any linked followers i and j, assume that the communication is triggered at event instant t i j k . Then, t i j k + 1 is the next event instant that satisfies h i j ( t ) = α e c t or h j i ( t ) = α e c t . Without loss of generality, we assume that h i j ( t i j k + 1 ) = α e c t i j k + 1 . Define p i j ( t ) = θ B K A + c e c t [ e ( A + c ) ( t t i j k ) 1 ] . For any t [ t i j k , t i j k + 1 ] , we can obtain that h i j ( t ) satisfies
h i j ( t ) = t i j k t e A ( t s ) B u i ( s ) d s B K e A t t i j k t e A s [ η ( s ) + 2 ( N 1 ) α e c s ] d s = B K e A t t i j k t e A s [ β e δ s φ ( 0 ) + 2 α β N λ N ( N 1 ) e c s e δ s δ c + 2 ( N 1 ) α e c s ] d s B K e A t t i j k t e A s [ β e c s φ ( 0 ) + 2 α β N λ N ( N 1 ) e c s δ c + 2 ( N 1 ) α e c s ] d s = θ B K e A t t i j k t e ( A + c ) s d s = p i j ( t ) .
It follows that p i j ( t i j k + 1 ) α e c t i j k + 1 . Notice that p i j ( t i j k ) = 0 < e c t i j k . We can obtain that there exists a time instant t p ( t i j k , t i j k + 1 ] such that p i j ( t p ) = e c t p . From the definition of p i j ( t ) we have
θ B K A + c e c t p [ e ( A + c ) ( t p t i j k ) 1 ] = e c t p ,
which implies that
t i j k + 1 t i j k t p t i j k = 1 A + c ln ( 1 + A + c θ B K ) .
 □

4. Containment Control with Input Delay

In this section, we consider the containment control problem for system (2) and (4). Same with the delay-free case that is considered in the last section, the following state difference estimators are needed.

4.1. Leader Edge State Difference Estimators

Suppose that follower i can access leader j’s state. Follower i can adopt the following estimator to estimate e i j ( t )
e ^ ˙ i j ( t ) = A e ^ i j ( t ) + B u i ( t τ ) ,
where e ^ i j ( 0 ) = e i j ( 0 ) , u i ( t ) = 0 , t [ τ , 0 ) . The solution of (34) is
e ^ i j ( t ) = e A t e ^ i j ( 0 ) + 0 t e A ( t s ) B u i ( s τ ) d s .

4.2. Neighbor Edge State Difference Estimators

Suppose that follower i can access follower j’s state. Note from (4) that
z ˙ i j ( t ) = A z i j ( t ) + B [ u i ( t τ ) u j ( t τ ) ] .
In the inter-event interval ( t i j k , t i j k + 1 ) , u j ( t ) is not available for follower i. Follower i can use the following estimator to estimate z i j ( t )
z ^ ˙ i j ( t ) = A z ^ i j ( t ) ,
where z ^ i j ( 0 ) = z i j ( 0 ) and z ^ i j ( t i j k ) = z i j ( t i j k ) . From (37) we have
z ^ i j ( t ) = e A ( t t i j k ) z ^ i j ( t i j k ) , t [ t i j k , t i j k + 1 ) .
From (36) we have
z i j ( t ) = e A ( t t i j k ) z i j ( t i j k ) + t i j k t e A ( t s ) B [ u i ( s τ ) u j ( s τ ) ] d s .
It follows that
z ˜ i j ( t ) = z ^ i j ( t ) z i j ( t ) = t i j k t e A ( t s ) B [ u i ( s τ ) u j ( s τ ) ] d s .

4.3. Event-Triggering Functions

Notice that when there exists a constant input delay τ , the estimating error z ˜ i j ( t ) depends on u i ( s τ ) u j ( s τ ) , which is different from the delay-free case. To achieve the control objective, the event trigging function should be adjusted accordingly. We use the following event trigging function for the edge ( j , i )
f i j ( t ) = b ( t ) h i j ( t ) ,
where h i j ( t ) = t i j k t e A ( t s ) B u i ( s τ ) d s for t [ t i j k , t i j k + 1 ) , b ( t ) is given in the last section.
Remark 3.
Notice that the event trigging function f i j ( t ) depends on the input of agent i only, which is different from the event trigging function in [43]. In [43], the event-triggered condition (19) is related to j L F a i j [ x j ( t ) x i ( t ) ] . Since agent i cannot access x j ( t ) during the inter-event interval, this signal is not available for agent i. So, the event trigging function in this paper is more feasible than that in [43].

4.4. Event-Triggered Containment Control Algorithms

Based on the state difference estimators and the event-triggering function, we consider the following containment algorithm
u i ( t ) = K e A τ j L a i j e ^ i j ( t ) + j F a i j z ^ i j ( t ) , i = M + 1 , , M + N .
With the input delay τ , (42) becomes
u i ( t τ ) = K e A τ j L a i j e ^ i j ( t τ ) + j F a i j z ^ i j ( t τ ) = K e A τ j L a i j e i j ( t τ ) + j F a i j z i j ( t τ ) K e A τ j F a i j z ˜ i j ( t τ ) = K e A τ φ i ( t τ ) K e A τ j F a i j z ˜ i j ( t τ ) = K φ i ( t ) t τ t { j L F a i j e A ( t s ) B u i ( s τ ) j F a i j e A ( t s ) B u j ( s τ ) } d s K e A τ j F a i j t i j t τ t τ e A ( t τ s ) B [ u i ( s τ ) u j ( s τ ) d s , i = M + 1 , , M + N ,
where t i j t τ is the last event instant on edge ( i , j ) before t τ , and t i j t τ = t τ if t τ is an event instant.
The proposed containment control algorithm is summarized in Algorithm 2.
Algorithm 2 Event-Triggered Containment Control Algorithm for Agent i: with input delay.
Initiation:
  • k 0 ;
  • for j L N i do
  •     receive x j ( 0 ) from leader j; e ^ i j ( 0 ) x i ( 0 ) x j ( 0 ) ;
  • end for
  • for j F N i do
  •     send x i ( 0 ) to follower j and receive x j ( 0 ) from follower j;
  •  
  •      t i j k 0 ; e ^ i j ( 0 ) x i ( 0 ) x j ( 0 ) ; f i j ( 0 ) α ;
  •  
  • end for
  • compute the controller u i ( 0 ) as in (42);
Iteration:
  1:
while t < T do
  2:
    for j L N i do
  3:
        compute e ^ i j ( t ) as in (35);
  4:
    end for
  5:
    for j F N i do
  6:
        compute f i j ( t ) as in (41);
  7:
        if f i j ( t ) 0 then
  8:
           send x i ( t ) to follower j and receive x j ( t ) from follower j; t i j k t ;
  9:
        end if
 10:
        compute z ^ i j ( t ) as in (38);
 11:
    end for
 12:
    compute the controller u i ( t ) as in (42).
 13:
end while
Theorem 3.
Consider a network with M leaders (2) and N followers (4), with a communication graph satisfies Assumption 1. Suppose that ( A , B ) is controllable, and all the poles of A are on the imaginary axis. Suppose that the event-triggered communication mechanism is adopted with triggering function (41). Let K = μ B T P ( γ ) , where P ( γ ) is the solution of the Riccati inequality (5), 2 μ λ 1 > 1 . For any τ > 0 , there exists a scalar γ * such that for any γ [ 0 , γ * ) , with control algorithm (42), all the followers will converge to the convex hull formed by the leaders.
Proof. 
Suppose that ( A , B ) is controllable, and all the poles of A are on the imaginary axis. For any γ > 0 , from Lemma 3 we have there exist a solution P ( γ ) satisfies the Riccati inequality (5). In the rest of this paper, we omit γ for simplicity. Let K = μ B T P . Consider the following function
V 1 ( t ) = i F φ i T ( t ) P φ i ( t ) .
From (4) and (8) we have
φ ˙ i ( t ) = A φ i ( t ) + B j L a i j u i ( t τ ) + j F a i j [ u i ( t τ ) u j ( t τ ) ] .
The derivative of V 1 ( t ) along the solution of (45) satisfies
V ˙ 1 ( t ) = 2 i F φ i T ( t ) P φ ˙ i ( t ) = 2 i F φ i T ( t ) P A φ i ( t ) + B { j L a i j u i ( t τ ) + j F a i j [ u i ( t τ ) u j ( t τ ) ] } = φ T ( t ) ( I N P A + A T P ) φ ( t ) + 2 φ T ( t ) ( L 2 P B ) u ( t τ )
where u ( t τ ) = u M + 1 ( t τ ) , , u M + N T ( t τ ) T . From (44) we have
u ( t τ ) = ( μ I N B T P ) [ φ ( t ) + t τ t ( L 2 e A ( t s ) B ) u ( s τ ) d s + t i j t τ t τ ( L ¯ 2 e A ( t s ) B ) u ( s τ ) d s ] ,
which, together with (47), yielding that
V ˙ 1 ( t ) = φ T ( t ) [ I N ( P A + A T P ) 2 ( μ L 2 P B B T P ) ] φ ( t ) + 2 φ T ( t ) ( μ L 2 P B B T P ) t τ t ( L 2 e A ( t s ) B ) u ( s τ ) d s + 2 φ T ( t ) ( μ L 2 P B B T P ) t i j t τ t τ ( L ¯ 2 e A ( t s ) B ) u ( s τ ) d s = φ T ( t ) [ I N ( P A + A T P ) 2 ( μ L 2 P B B T P ) ] φ ( t ) + 2 φ T ( t ) ( μ L 2 2 P B B T P ) t τ t ( I N e A ( t s ) B ) u ( s τ ) d s + 2 φ T ( t ) ( μ L 2 L ¯ 2 P B B T P ) t i j t τ t τ ( I N e A ( t s ) B ) u ( s τ ) d s .
Also, from (44) we have
u ( t τ ) = ( μ I N B T P e A τ ) [ φ ( t τ ) e ( t τ ) ] .
It follows that
V ˙ 1 ( t ) = φ T ( t ) [ I N ( P A + A T P ) 2 ( μ L 2 P B B T P ) ] φ ( t ) 2 φ T ( t ) ( μ 2 L 2 2 P B B T P ) t τ t ( I N e A ( t s ) B B T P e A τ ) [ φ ( s τ ) e ( s τ ) ] + 2 φ T ( t ) ( μ L 2 L ¯ 2 P B B T P ) t i j t τ t τ ( I N e A ( t s ) B ) u ( s τ ) d s φ T ( t ) [ I N ( P A + A T P ) 2 ( μ L 2 P B B T P ) ] φ ( t ) + φ T ( t ) [ ( 2 k μ 4 L 2 4 + k μ 2 L 2 L ¯ 2 2 L 2 ) P B B T P ] φ ( t ) + n γ k { π 1 T ( t ) ( I N P ) π 1 ( t ) + π 2 T ( t ) ( I N P ) π 2 ( t ) + π 3 T ( t ) ( I N P ) π 3 ( t ) } ,
where we have used the fact that P B B T P n γ P , which is obtained from Lemma 3, L ¯ 2 is the Laplacian matrix corresponding to the communication topology among the followers, and
π 1 ( t ) = t τ t ( I N e A ( t s ) B B T P e A τ ) φ ( s τ ) d s , π 2 ( t ) = t τ t ( I N e A ( t s ) B B T P e A τ ) e ( s τ ) ] d s , π 3 ( t ) = t i j t τ t τ ( I N e A ( t s ) B ) u ( s τ ) d s .
Define ξ ( t ) = ( U 1 I n ) φ ( t ) . It follows from (51) and (5) that
V ˙ 1 ( t ) ξ T ( t ) [ I N ( P A + A T P ) 2 ( μ U T L 2 U P B B T P ) ] ξ ( t ) + ξ T ( t ) [ ( 2 k μ 4 U T L 2 4 U + k μ 2 U T L 2 L ¯ 2 2 L 2 U ) P B B T P ] ξ ( t ) + n γ k { π ˜ 1 T ( t ) ( I N P ) π ˜ 1 ( t ) + π 2 T ( t ) ( I N P ) π 2 ( t ) + π 3 T ( t ) ( I N P ) π 3 ( t ) } ξ T ( t ) [ I N ( γ P ) ( 2 λ 1 μ 1 ) I N P B B T P ] ξ ( t ) + ξ T ( t ) [ ( 2 k μ 4 U T L 2 4 U + k μ 2 U T L 2 L ¯ 2 2 L 2 U ) P B B T P ] ξ ( t ) + n γ k { π ˜ 1 T ( t ) ( I N P ) π ˜ 1 ( t ) + π 2 T ( t ) ( I N P ) π 2 ( t ) + π 3 T ( t ) ( I N P ) π 3 ( t ) }
where
π ˜ 1 ( t ) = t τ t ( U e A ( t s ) B B T P e A τ ) ξ ( s τ ) d s .
By Jensen inequality and Lemma 3 we have
π ˜ 1 T ( t ) ( I N P ) π ˜ 1 ( t ) τ t τ t ξ T ( s τ ) ( U T U e A τ P B B T e A ( t s ) P e A ( t s ) B B T P e A τ ) ξ ( s τ ) d s τ t τ t ξ T ( s τ ) ( I N e ( n 1 ) γ ( t s ) e A τ P B B T P B B T P e A τ ) ξ ( s τ ) d s τ t τ t ξ T ( s τ ) ( I N n 2 γ 2 e ( n 1 ) γ ( t s ) e A τ P e A τ ) ξ ( s τ ) d s τ t τ t ξ T ( s τ ) ( I N n 2 γ 2 e ( n 1 ) γ ( τ + t s ) P ) ξ ( s τ ) d s τ n 2 γ 2 e 2 ( n 1 ) γ τ t τ t ξ T ( s τ ) ( I N P ) ξ ( s τ ) d s τ n 2 γ 2 e 2 ( n 1 ) γ τ t 2 τ t ξ T ( s ) ( I N P ) ξ ( s ) d s ,
and
π 2 T ( t ) ( I N P ) π 2 ( t ) τ n 2 γ 2 e 2 ( n 1 ) γ τ t 2 τ t e T ( s ) ( I N P ) e ( s ) d s λ m a x ( P ) τ n 2 γ 2 e 2 ( n 1 ) γ τ t 2 τ t e T ( s ) e ( s ) d s λ m a x ( P ) τ n 2 γ 2 e 2 ( n 1 ) γ τ t 2 τ t α N N 1 e 2 c s d s 2 α N N 1 λ m a x ( P ) τ 2 n 2 γ 2 e 2 ( n 1 ) γ τ e 2 c ( t 2 τ ) .
From the definition of the event-triggering function (41) we have π 3 T ( t ) π 3 ( t ) α 2 e 2 c t , from which we have
π 3 T ( t ) ( I N P ) π 3 ( t ) N λ m a x ( P ) α 2 e 2 c ( t τ ) .
Define
V 2 ( t ) = n γ k n 2 γ 2 e 2 ( n 1 ) γ τ 0 2 τ t s t ξ T ( l ) ( I N P ) ξ ( l ) d l d s .
We have
V ˙ 2 ( t ) = 2 τ n γ k n 2 γ 2 e 2 ( n 1 ) γ τ ξ T ( t ) ( I N P ) ξ ( t ) n γ k τ n 2 γ 2 e 2 ( n 1 ) γ τ t 2 τ t ξ T ( s ) ( I N P ) ξ ( s ) d s .
Consider the following Lyapunov function
V ( t ) = V 1 ( t ) + V 2 ( t ) .
From (52)–(55) we have
V ˙ ( t ) ξ T ( t ) [ I N ( γ P ) ( 2 λ 1 μ 1 ) I N P B B T P ] ξ ( t ) + ξ T ( t ) [ ( 2 k μ 4 U T L 2 4 U + k μ 2 U T L 2 L ¯ 2 2 L 2 U ) P B B T P ] ξ ( t ) + 2 τ n γ k n 2 γ 2 e 2 ( n 1 ) γ τ ξ T ( t ) ( I N P ) ξ ( t ) + n γ k 2 α N N 1 λ m a x ( P ) τ 2 n 2 γ 2 e 2 ( n 1 ) γ τ e 2 c ( t 2 τ ) + n γ k N λ m a x ( P ) α 2 e 2 c ( t τ ) .
Because 2 λ 1 μ > 1 , there exists a small enough k such that 2 k μ 4 U T L 2 4 U + k μ 2 U T L 2 L ¯ 2 2 L 2 U ( 2 λ 1 μ 1 ) I N . Then, we have
V ˙ ( t ) ( 1 2 τ n k n 2 γ 2 e 2 ( n 1 ) γ τ ) γ ξ T ( t ) [ I N P ) ] ξ ( t ) + n γ k 2 α N N 1 λ m a x ( P ) τ 2 n 2 γ 2 e 2 ( n 1 ) γ τ e 2 c ( t 2 τ ) + n γ k N λ m a x ( P ) α 2 e 2 c ( t τ ) .
For any τ > 0 , there exists a γ * such that 1 2 τ n k n 2 γ 2 e 2 ( n 1 ) γ τ > 1 2 for any γ [ 0 , γ * ) . Therefore it follows that
V ˙ ( t ) γ 2 ξ T ( t ) [ I N P ) ] ξ ( t ) + n γ k 2 α N N 1 λ m a x ( P ) τ 2 n 2 γ 2 e 2 ( n 1 ) γ τ e 2 c ( t 2 τ ) + n γ k N λ m a x ( P ) α 2 e 2 c ( t τ ) .
Notice that the last two terms converge to zero exponentially, we conclude that ξ ( t ) converge to zero asymptotically, which implies that the followers converge to the convex hull formed by the leaders. □
Remark 4.
From Theorem 3 we can see that for arbitrarily large but bounded delays, all the followers will converge to the convex hull formed by the leaders. In contrast, the algorithms in [43] require that the input delay is smaller than an upper bound.

5. Simulation Examples

This section gives a numerical example to show the effectiveness of the proposed algorithms. Consider a network with 10 followers and 4 leaders in the two-dimensional space. The parameter matrices A and B are
A = 0 0 1 0 0 0 0 1 0 0 0 0 0 0 0 0 , B = 0 0 0 0 1 0 0 1 .
Suppose that x 1 ( t ) = 1 + 0.8 t , 1 + 0.15 t T , x 2 ( t ) = 5 + 0.75 t , 1 + 0.15 t T , x 3 ( t ) = 4 + 0.8 t , 6 + 0.1 t T and x 4 ( t ) = 8 + 0.75 t , 6 + 0.1 t T . Initial positions of the followers are chosen as x 5 ( 0 ) = 1 , 1 T , x 6 ( 0 ) = 2 , 1 T , x 7 ( 0 ) = 3 , 1 T , x 8 ( 0 ) = 3 , 3 T , x 9 ( 0 ) = 0 , 3 T , x 10 ( 0 ) = 5 , 3 T , x 11 ( 0 ) = 8 , 3 T , x 12 ( 0 ) = 2 , 7 T , x 13 ( 0 ) = 5 , 7 T , and x 14 ( 0 ) = 9 , 8 T . Initial velocities of the followers are chosen as zero.
The network graph associated with the 14 agents is shown by Figure 1, and the corresponding Laplacian matrices are as following
L 1 = 1 1 1 0 0 1 1 1 0 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 , L 2 = 5 1 0 0 1 0 0 0 0 0 1 6 1 0 0 1 0 0 0 0 0 1 6 0 0 1 1 0 0 0 0 0 0 1 1 0 0 0 0 0 1 0 0 1 4 1 0 1 0 0 0 1 1 0 1 5 1 0 1 0 0 0 1 0 0 1 3 0 0 1 0 0 0 0 1 0 0 1 0 0 0 0 0 0 0 1 0 0 1 0 0 0 0 0 0 0 1 0 0 1 .
It is easy to obtain that the smallest eigenvalue of L 2 is λ 1 = 0.2845 .
Containment control without input delay. We verify the effectiveness of containment control algorithm (20) and trigger function (18) first. Chose a = 1 . By solving matrix equality (25) we can obtain P = 1.5839 0 0.7543 0 0 1.5839 0 0.7543 0.7543 0 1.1947 0 0 0.7543 0 1.1947 . According to Theorem 1, we can set K as
K = B T P = 0.7543 0 1.1947 0 0 0.7543 0 1.1947 .
Let α = 1 , c = 0.01 . Figure 2 shows positions of vehicles 1 to 14 at time instants 0 s, 5 s, 10 s, and 15 s. It can be seen that agents 5 to 14 move into the convex hull spanned by agents 1 to 4. Figure 3 shows the event instants on edges 1 to 12. Table 1 and Table 2 show numbers of event instants counted by edge and agent, respectively. From Table 2 we can see that for most agents, the communication burden is light. However, for agents with many neighbor edges (agents 9–11), their communication burdens are heavy.
Containment control with input delay. Let τ = 0.1 s. By solving parametric Riccati Equation (5) with γ = 0.001 , we can obtain P = 0.0080 0 0.0316 0 0 0.0080 0 0.0316 0.0316 0 0.2535 0 0 0.0316 0 0.2535 . Let μ = 2 . According to Theorem 3, we can set K as
K = μ B T P = 0.0632 0 0.5069 0 0 0.0632 0 0.5069 .
Figure 4 shows positions of agents 1 to 14 using Algorithm 2. It can be seen that agents 5 to 14 move into the convex hull spanned by vehicles 1 to 4. Figure 5 shows the event instants on edges 1 to 12. Table 3 and Table 4 show numbers of event instants counted by edge and by agent, respectively.
Suppose that τ = 0.5 s. By solving parametric Riccati Equation (5) with γ = 0.0002 , we can obtain P = 0.0024 0 0.0141 0 0 0.0024 0 0.0141 0.0141 0 0.1688 0 0 0.0141 0 0.1688 . Let μ = 2 . According to Theorem 3, we can set K as
K = μ B T P = 0.0283 0 0.3375 0 0 0.0283 0 0.3375 .
Figure 6 shows positions of agents 1 to 14. It can be seen that agents 5 to 14 move into the convex hull spanned by vehicles 1 to 4. Figure 7 shows the event instants on edges 1 to 12. Table 5 and Table 6 show numbers of event instants counted by edge and by agent, respectively.
Remark 5.
From Figure 4 and Figure 6 we can see that the converge speed is lower when τ is larger. In fact, when the input delay τ is getting larger, according to Theorem 3, we should choose a smaller γ. From Lemma 3 we know that lim γ 0 + P ( γ ) = 0 . So, when γ is small, the gain matrix K is small, which leads to low converge speed.

6. Conclusions

The event-triggered containment control problem has been considered in this paper, and two control algorithms have been proposed for multi-agent systems without and with input delay, respectively. Continuous communication has been avoided in the proposed triggering conditions. With the proposed algorithms, we have proved that all the followers can be driven into the convex hull formed by the leaders. When there is not input delay, it has been proved that the Zeno behavior can be avoided. Compared with some existing algorithms for the containment control problem with input delay, the proposed algorithm can deal with arbitrarily large input delay. The proposed triggering conditions can be detected dependently by each agent, while existing triggering conditions in those literatures on event-triggered containment control need to be realized in a centralized way.

Author Contributions

Conceptualization, J.L., C.L., X.Y. and W.C.; methodology, J.L.; software, C.L.; validation, J.L., X.Y. and W.C.; formal analysis, J.L.; data curation, C.L.; writing—original draft preparation, J.L. and C.L.; writing—review and editing, J.L.; funding acquisition, J.L.

Funding

This work was supported by National Natural Science Foundation of China under grant 61503162, Natural Science Fundamental Research Project of Jiangsu Colleges and Universities under Grant 18KJB520010.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Olfati-Saber, R.; Fax, J.A.; Murray, R.M. Consensus and cooperation in networked multi-agent systems. Proc. IEEE 2007, 95, 215–233. [Google Scholar] [CrossRef]
  2. Ren, W.; Beard, R.W. Distributed Consensus in Multi-Vehicle Cooperative Control; Springer: London, UK, 2008; ISBN 978-1-84800-014-8. [Google Scholar]
  3. Cao, M.; Morse, A.S.; Anderson, B.D.O. Agreeing asynchronously. IEEE Trans. Autom. Control 2008, 53, 1826–1838. [Google Scholar] [CrossRef]
  4. Cao, Y.; Yu, W.; Ren, W.; Chen, G. An overview of recent progress in the study of distributed multi-agent coordination. IEEE Trans. Ind. Inform. 2013, 9, 427–438. [Google Scholar] [CrossRef]
  5. Gulzar, M.M.; Rizvi, S.T.H.; Javed, M.Y.; Munir, U.; Asif, H. Multi-agent cooperative control consensus: A comparative review. Electronics 2018, 7, 22. [Google Scholar] [CrossRef]
  6. Ji, M.; Ferrari-Trecate, G.; Egerstedt, M.; Buffa, A. Containment control in mobile networks. IEEE Trans. Autom. Control 2008, 53, 1972–1975. [Google Scholar] [CrossRef]
  7. Cao, Y.; Stuart, D.; Ren, W.; Meng, Z. Distributed containment control for multiple autonomous vehicles with double-integrator dynamics: algorithms and experiments. IEEE Trans. Control Syst. Technol. 2011, 19, 929–938. [Google Scholar] [CrossRef]
  8. Cao, Y.; Ren, W.; Egerstedt, M. Distributed containment control with multiple stationary or dynamic leaders in fixed and switching directed networks. Automatica 2012, 48, 1586–1597. [Google Scholar] [CrossRef]
  9. Shi, G.; Hong, Y.; Johansson, K.H. Connectivity and set tracking of multi-agent systems guided by multiple moving leaders. IEEE Trans. Autom. Control 2012, 57, 663–676. [Google Scholar] [CrossRef]
  10. Lou, Y.; Hong, Y. Target containment control of multi-agent systems with random switching interconnection topologies. Automatica 2012, 48, 879–885. [Google Scholar] [CrossRef]
  11. Meng, Z.; Ren, W.; You, Z. Distributed finite-time attitude containment control for multiple rigid bodies. Automatica 2010, 46, 2092–2099. [Google Scholar] [CrossRef]
  12. Qin, J.; Zheng, W.; Gao, H.; Ma, Q.; Fu, W. Containment control for second-order multiagent systems communicating over heterogeneous networks. IEEE Trans. Neural Netw. Learn. Syst. 2017, 28, 2143–2155. [Google Scholar] [CrossRef] [PubMed]
  13. Li, J.; Ren, W.; Xu, S. Distributed containment control with multiple dynamic leaders for double-integrator dynamics using only position measurements. IEEE Trans. Autom. Control 2012, 57, 1553–1559. [Google Scholar] [CrossRef]
  14. Liu, H.; Xie, G.; Wang, L. Containment of linear multi-agent systems under general interaction topologies. Syst. Control Lett. 2012, 61, 528–534. [Google Scholar] [CrossRef]
  15. Li, Z.; Ren, W.; Liu, X.; Fu, M. Distributed containment control of multi-agent systems with general linear dynamics in the presence of multiple leaders. Int. J. Robust Nonlinear Control 2013, 23, 534–547. [Google Scholar] [CrossRef]
  16. Wen, G.; Zhao, Y.; Duan, Z.; Yu, W.; Chen, G. Containment of higher-order multi-leader multi-agent systems: A dynamic output approach. IEEE Trans. Autom. Control 2015, 61, 1135–1140. [Google Scholar] [CrossRef]
  17. Cheng, L.; Wang, Y.; Ren, W.; Hou, Z.-G.; Tan, M. Containment control of multiagent systems with dynamic leaders based on a PIn-Type approach. IEEE Trans. Cybern. 2016, 46, 3004–3017. [Google Scholar] [CrossRef] [PubMed]
  18. Tabuada, P. Event-triggered real-time scheduling of stabilizing control tasks. IEEE Trans. Autom. Control 2007, 52, 1680–1685. [Google Scholar] [CrossRef]
  19. Zhang, B.-L.; Han, Q.-L.; Zhang, X.-M. Event-triggered H control for offshore structures in network environments. J. Sound Vib. 2016, 368, 1–21. [Google Scholar] [CrossRef]
  20. Zhang, X.-M.; Zhang, Q.-L. A decentralized event-triggered dissipative control scheme for systems with multiple sensors to sample the system outputs. IEEE Trans. Cybern. 2016, 46, 2745–2757. [Google Scholar] [CrossRef] [PubMed]
  21. Wang, Y.-L.; Shi, P.; Lim, C.-C.; Liu, Y. Event-triggered fault detection filter design for a continuous-time networked control system. IEEE Trans. Cybern. 2016, 46, 3414–3426. [Google Scholar] [CrossRef] [PubMed]
  22. Wang, Y.-L.; Shi, P.; Lim, C.-C. Adaptively adjusted event-triggering mechanism on fault detection for networked control systems. IEEE Trans. Cybern. 2017, 47, 2299–2311. [Google Scholar] [CrossRef] [PubMed]
  23. Zhang, X.-M.; Han, Q.-L. Network-based H filtering using a logic jumping-like trigger. Automatica 2013, 49, 1428–1435. [Google Scholar] [CrossRef]
  24. Yue, D.; Tian, E.; Han, Q.-L. A delay system method for designing event-triggered controllers of networked control systems. IEEE Trans. Autom. Control 2013, 58, 475–481. [Google Scholar] [CrossRef]
  25. Zhang, X.-M.; Han, Q.-L.; Zhang, B.-L. An overview and deep investigation on sampled-data-based event-triggered control and filtering for networked systems. IEEE Trans. Ind. Inform. 2016, 13, 4–16. [Google Scholar] [CrossRef]
  26. Li, Y.; Liu, X.; Peng, L. An event-triggered fault detection approach in cyber-physical systems with sensor nonlinearities and deception attacks. Electronics 2018, 7, 168. [Google Scholar] [CrossRef]
  27. Dimarogonas, D.V.; Frazzoli, E.; Johansson, K.H. Distributed event-triggered control for multi-agent systems. IEEE Trans. Autom. Control 2012, 57, 1291–1297. [Google Scholar] [CrossRef]
  28. Seyboth, G.S.; Dimarogonas, D.V.; Johansson, K.H. Event-based broadcasting for multi-agent average consensus. Automatica 2013, 49, 245–252. [Google Scholar] [CrossRef]
  29. Wu, Y.; Meng, X.; Xie, L.; Lu, R.; Su, H. An input-based trigging approach to leader-following problems. Automatica 2017, 5, 221–228. [Google Scholar] [CrossRef]
  30. Ding, L.; Han, Q.-L.; Ge, X.; Zhang, X.M. An overview of recent advances in event-triggered consensus of multiagent systems. IEEE Trans. Cybern. 2018, 48, 1110–1123. [Google Scholar] [CrossRef] [PubMed]
  31. Xia, H.; Zheng, W.; Shao, J. Event-triggered containment control for second-order multi-agent systems with sampled position data. ISA Trans. 2018, 73, 91–99. [Google Scholar] [CrossRef] [PubMed]
  32. Zou, W.; Xiang, Z. Event-triggered distributed containment control of heterogeneous linear multi-agent systems by an output regulation approach. Int. J. Syst. Sci. 2017, 48, 2041–2054. [Google Scholar] [CrossRef]
  33. Zou, W.; Xiang, Z. Event-triggered containment control of second-order nonlinear multi-agent systems. J. Frankl. Inst. 2018. [Google Scholar] [CrossRef]
  34. Zhang, B.-L.; Han, Q.-L.; Zhang, X.-M.; Yu, X. Sliding mode control with mixed current and delayed states for offshore steel jacket platform. IEEE Trans. Control Syst. Technol. 2014, 22, 1769–1783. [Google Scholar] [CrossRef]
  35. Xiao, S.-P.; Xu, L.; Zeng, H.; Teo, K. Improved stability criteria for discrete-time delay systems via novel summation inequalities. Int. J. Control Autom. Syst. 2018, 16, 1592–1602. [Google Scholar] [CrossRef]
  36. Xiao, S.-P.; Lian, H.; Teo, K.; Zeng, H.-B.; Zhang, X.-H. A new Lyapunov functional approach to sampled-data synchronization control for delayed neural networks. J. Frankl. Inst. 2018, 355, 8857–8873. [Google Scholar] [CrossRef]
  37. Zhang, X.-M.; Han, Q.-L. Abel lemma-based finite-sum inequality and its application to stability analysis for linear discrete time-delay system. Automatica 2015, 57, 199–202. [Google Scholar] [CrossRef]
  38. Xu, S.; Lam, J. On equivalence and efficiency of certain stability criteria for time-delay systems. IEEE Trans. Autom. Control 2007, 52, 95–101. [Google Scholar] [CrossRef]
  39. Zhang, B.; Zheng, W.; Xu, S. Filtering of markovian jump delay systems based on a new performance index. IEEE Trans. Circuits Syst.-I Regul. Pap. 2013, 60, 1250–1263. [Google Scholar] [CrossRef]
  40. Ma, Q.; Feng, G.; Xu, S. Delay-dependent stability criteria for reaction–diffusion neural networks with time-varying delays. IEEE Trans. Cybern. 2013, 43, 1913–1920. [Google Scholar] [CrossRef] [PubMed]
  41. Zhou, B.; Lin, Z. Consensus of high-order multi-agent systems with large input and communication delays. Automatica 2014, 50, 452–464. [Google Scholar] [CrossRef]
  42. Liu, K.; Xie, G.M.; Wang, L. Containment control for second-order multi-agent systems with time-varying delays. Syst. Cont. Lett. 2014, 67, 24–31. [Google Scholar] [CrossRef]
  43. Miao, G.; Cao, J.; Alsaedi, A.; Alsaadi, F.E. Event-triggered containment control for multi-agent systems with constant time delays. J. Frankl. Inst. 2017, 354, 6956–6977. [Google Scholar] [CrossRef]
Figure 1. The network topology associated with vehicles 1 to 14. Here i denotes vehicle i, i = 1 , , 14 .
Figure 1. The network topology associated with vehicles 1 to 14. Here i denotes vehicle i, i = 1 , , 14 .
Electronics 07 00343 g001
Figure 2. Positions of agents 1 to 14 using Algorithm 1, where squares denote leaders and circles denote followers.
Figure 2. Positions of agents 1 to 14 using Algorithm 1, where squares denote leaders and circles denote followers.
Electronics 07 00343 g002
Figure 3. Event instants on edges 1–12 ( τ = 0 , 15 s).
Figure 3. Event instants on edges 1–12 ( τ = 0 , 15 s).
Electronics 07 00343 g003
Figure 4. Positions of agents 1 to 14 using Algorithm 2 with τ = 0.1 , where squares denote leaders and circles denote followers.
Figure 4. Positions of agents 1 to 14 using Algorithm 2 with τ = 0.1 , where squares denote leaders and circles denote followers.
Electronics 07 00343 g004
Figure 5. Event instants on edges 1–12 ( τ = 0.1 , 30 s).
Figure 5. Event instants on edges 1–12 ( τ = 0.1 , 30 s).
Electronics 07 00343 g005
Figure 6. Positions of agents 1 to 14 using Algorithm 2 with τ = 0.5 , where squares denote leaders and circles denote followers.
Figure 6. Positions of agents 1 to 14 using Algorithm 2 with τ = 0.5 , where squares denote leaders and circles denote followers.
Electronics 07 00343 g006
Figure 7. Event instants on edges 1–12 ( τ = 0.5 , 50 s).
Figure 7. Event instants on edges 1–12 ( τ = 0.5 , 50 s).
Electronics 07 00343 g007
Table 1. Number of event instants of each edge ( τ = 0 , 15 s).
Table 1. Number of event instants of each edge ( τ = 0 , 15 s).
edge123456789101112
connected agents5–65–96–76–107–107–118–99–109–1210–1110–1311–14
number of event instants9198404016263125393823
Table 2. Number of event instants of each agent ( τ = 0 , 15 s).
Table 2. Number of event instants of each agent ( τ = 0 , 15 s).
agent567891011121314
number of event instants2857642610119878253823
Table 3. Number of event instants of each edge ( τ = 0.1 , 30 s).
Table 3. Number of event instants of each edge ( τ = 0.1 , 30 s).
edge123456789101112
connected agents5–65–96–76–107–107–118–99–109–1210–1110–1311–14
number of event instants82412172319262826252320
Table 4. Number of event instants of each agent ( τ = 0.1 , 30 s).
Table 4. Number of event instants of each agent ( τ = 0.1 , 30 s).
agent567891011121314
number of event instants3237542611411644262320
Table 5. Number of event instants of each edge ( τ = 0.1 , 50 s).
Table 5. Number of event instants of each edge ( τ = 0.1 , 50 s).
edge123456789101112
connected agents5–65–96–76–107–107–118–99–109–1210–1110–1311–14
number of event instants102510778023248124818022
Table 6. Number of event instants of each agent ( τ = 0.5 , 50 s).
Table 6. Number of event instants of each agent ( τ = 0.5 , 50 s).
agent567891011121314
number of event instants359711324154399104248022

Share and Cite

MDPI and ACS Style

Li, J.; Li, C.; Yang, X.; Chen, W. Event-Triggered Containment Control of Multi-Agent Systems With High-Order Dynamics and Input Delay. Electronics 2018, 7, 343. https://doi.org/10.3390/electronics7120343

AMA Style

Li J, Li C, Yang X, Chen W. Event-Triggered Containment Control of Multi-Agent Systems With High-Order Dynamics and Input Delay. Electronics. 2018; 7(12):343. https://doi.org/10.3390/electronics7120343

Chicago/Turabian Style

Li, Jianzhen, Chenglong Li, Xiaofei Yang, and Wei Chen. 2018. "Event-Triggered Containment Control of Multi-Agent Systems With High-Order Dynamics and Input Delay" Electronics 7, no. 12: 343. https://doi.org/10.3390/electronics7120343

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop