Next Article in Journal
Optimal H1-Norm Estimation of Nonconforming FEM for Time-Fractional Diffusion Equation on Anisotropic Meshes
Previous Article in Journal
Fractals: An Eclectic Survey, Part II
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Distributed Adaptive Mittag–Leffler Formation Control for Second-Order Fractional Multi-Agent Systems via Event-Triggered Control Strategy

1
Department of Mathematics, Lyuliang University, Lyuliang 033001, China
2
School of Science, Yanshan University, Qinhuangdao 066001, China
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Fractal Fract. 2022, 6(7), 380; https://doi.org/10.3390/fractalfract6070380
Submission received: 4 June 2022 / Revised: 24 June 2022 / Accepted: 29 June 2022 / Published: 4 July 2022
(This article belongs to the Section Complexity)

Abstract

:
This brief investigates the Mittag–Leffler formation bounded control problem for second-order fractional multi-agent systems (FMASs), where the dynamical nodes of followers are modeled to satisfy quadratic (QUAD) condition. Firstly, under the undirected communication topology, for the considered second-order nonlinear FMASs, a distributed event-triggered control scheme (ETCS) is designed to realize the global Mittag–Leffler bounded formation control goal. Secondly, by introducing adaptive weights into triggering condition and control protocol, an adaptive event-triggered formation protocol is presented to achieve the global Mittag–Leffler bounded formation. Thirdly, a five-step algorithm is provided to describe protocol execution steps. Finally, two simulation examples are given to verify the effectiveness of the proposed schemes.

1. Introduction

In the past few decades, there has been increasingly attention for the cooperative control of multi-agent systems (MASs) from various application fields, such as social sciences, artificial intelligence, and military, and so on [1,2,3,4,5,6]. As an important component of cooperative control, the formation control, which aims to motivate agents to achieve a predefined configuration under the designed control protocols, has been widely applied in many practical fields, for example, unmanned aerial vehicle [7], multi-robot systems [8], and biological system [9].
Recently, a lot of scholars have paid their attention to the formation control of multi-agent systems (MASs), and some significant works have been reported. Such as in [10], a neuro-adaptive formation scheme for nonlinear MASs with time-delay was designed to realize target tracking. In [11], under the directed communication graphs, by equipping the event-triggered approach and applying complex Laplace transform, a distributed control scheme was presented to achieve the time-invariant formation control (TIFC) for networked MASs. In [12], the authors developed the design method of the TIFC protocol for second-order MASs based on sampled data on a fixed directed communication topology. In [13], the formation-containment target was achieved for general linear MASs under a discontinuous protocol, where the dynamics of leader is influenced by unknown input. In [14], by applying an adaptive output–feedback approach, Wang investigated the time-variant formation control (TVFC) of nonlinear MASs with switching networks. In [15], by using a sliding mode method, under the influence of random disturbances, a novel ETCS was proposed to analyze the stability of error system for second-order MASs.
It is worth noting that, in the above mentioned literature [10,11,12,13,14,15], the obtained results focus on the integer-order MASs. However, in practical applications, such as engineering, manufacturing, aerospace, and artificial intelligence, the fractional systems can give a more accurate description for various processes with the characterization of hereditary and memory properties [16], and many results have been derived [17,18,19,20,21,22]. Recently, some achievements have emerged in regard to the formation control of fractional-order MASs. For example, in [23], by applying a frequency-domain analytical method, the formation problem was studied for double-integrator FMASs. Liu et al. in [24] designed an active reconfigurable control scheme to address the distributed formation tracking control problem for MASs with multiple leaders under actuator faults and constraints. In [25], Gong proposed an observer-based protocol to address the TVFC problem for FMASs with general linear dynamics, where the topology structure is selected as fixed and switched, respectively. In [26], by using the sliding mode strategy, a distributed feedback control scheme was designed to solve the problems of consensus and formation for FMASs.
On the one hand, in most traditional formation control strategies, such as a sliding mode scheme, impulsive strategy, and periodic sampling scheme, agents are always assumed to obtain continuous information from their neighbors, and information transmission occurs in either continuous or cyclical time. However, in practical applications, continuous exchange of information cannot be guaranteed because of the limitations of communication bandwidth and energy supply, which brings a lot of inconvenience. In addition, the continual monitoring of information might result in an enormous energy and financial waste. Therefore, researchers proposed an event-triggered control strategy (ETCS). Under this control mechanism, information communication proceeds after a predetermined event occurred, which can guarantee the expected performance and reduce communication costs. Based on the above advantages, ETCS have been widely used in the study of MASs in [27,28,29,30,31]. In [28], the authors applied stability theory of FMASs and developed a differential inequality convex function to address the consensus problem for discontinuous singularly perturbed MASs based on ETCS. In [29], under interplay between control gains and parameters, by employing the discrete-time signals from neighbors and co-design approach, two novel ETCS were presented to investigate the consensus issue of general MASs with linear growth. In [31], under the periodic DoS attacks, the problem of MASs formation was discussed via novel attack-resilient ETCS, and the generalized Nyquist stability criterion was used to analyze the error systems.
It should be pointed out that, in literature [28,29,31], the design of control protocols is related to some global or unknown knowledge, such as the Laplacian matrix eigenvalue information, and the knowledge of the unknown nonlinear dynamics. To overcome this drawback, the distributed adaptive updating law is proposed. Recently, some scholars have combined the advantages of ETCS and adaptive control to design the adaptive event-triggered control. In addition, some admirable results were obtained [32,33,34,35]. For example, in [34], the TVFC issue of linear MASs was considered under the proposed adaptive ETCS with adjustable time-variant parameters. In [35], the authors developed an adaptive ETCS and a novel Lyapunov function to handle the asymptotic tracking problem for uncertain nonlinear systems with unknown virtual control coefficients.
It should be pointed out that most of works in [27,28,29,30,31,32,33,34,35] are concerned with the formation control of first-order integer system, which can not accurately characterize some complex dynamic behaviors in practical application. To the best of our knowledge, a few results are concerned with the formation control problem of second-order FMASs. Particularly, the distributed event-triggered control protocol and adaptive event-triggered mechanism are adopted to address the formation problem of second-order FMASs.
Motivated by the above discussion, in this paper, our objective is to address the global Mittag–Leffler bounded formation control issue for second-order FMASs with QUAD inherent dynamics under the designed event-triggered and adaptive event-triggered control mechanisms. Compared with the previous results, the significant innovations are demonstrated as follows:
  • This paper extends the formation control problem for MASs to the case of fractional order. In the existing works [36,37], the results mainly focus on the integer order MASs, which can be regarded as special cases of this paper. Therefore, the results in this paper are more general.
  • The system model is modeled to second-order MASs, which is not only related to position information but also to velocity information. Compared with literature [34,38], where the system model only considers position information, the established system model is more realistic.
  • An adaptive event-triggered control protocol is developed, where the global information of Laplacian matrix is not required. Different from the proposed state-dependent triggering conditions in [27,28,29,30,31], a constant is introduced into triggering conditions in this paper to address the formation control issue and avoid the occurrence of Zeno behavior.
The remainder of this brief is organized as follows: in Section 2, some preliminary knowledge and the problem formulation are introduced. The main results are proposed in Section 3. The executive flow algorithm in regard to protocol is presented in Section 4. Two numerical simulations are given in Section 5. Finally, the conclusions are listed in Section 6.
Notation: see Table 1.

2. Preliminaries and Problem Formulation

2.1. Basic Graph Theory

The topology between follower agents v ˜ 1 , v ˜ 2 , , v ˜ N 1 and v ˜ N can be described by an undirected graph g  = ( V ˜ , E , A ) , where V ˜ = { v ˜ 1 , v ˜ 2 , , v ˜ N } denotes the set of N followers in g; E V ˜ × V ˜ intends the set of edge ( v ˜ i , v ˜ j ) in g, where edge ( v ˜ i , v ˜ j ) shows the information communication between v ˜ i and v ˜ j ; A = [ a i j ] R N × N is the weighted adjacency matrix of g. For an undirected graph, the elements of adjacency A satisfy that a i j 0 if and only if ( v ˜ i , v ˜ j ) E , and a i j = 0 , otherwise. Moreover, we suppose there is no self-loops, i.e., a i i = 0 in g for all i { 1 , 2 , , N } . The adjacency matrix for the leader is defined E = diag { a 10 , a 20 , , a N 0 } , a i 0 represents connected weight between the leader and the follower i. The neighbor set of v ˜ i is denoted N i = { v ˜ j V ˜ , ( v ˜ j , v ˜ i ) E } . The in-degree deg i n of v ˜ i is defined as deg i n ( v ˜ i ) = j = 1 N | a i j | . The Laplacian matrix corresponding to g is L = D A R N × N , where D = diag { deg i n ( v ˜ 1 ) , deg i n ( v ˜ 2 ) , , deg i n ( v ˜ N ) } . There is a path from v ˜ i to v ˜ j if there exists a finite ordered edge belongs to the edge set such that { ( v ˜ i , v ˜ k 1 ) , ( v ˜ k 1 , v ˜ k 2 ) , . . . , ( v ˜ k w 1 , v ˜ k w ) , ( v ˜ k w , v ˜ j ) } E holds. If there exists at least a path between any two nodes, the undirected graph is said to be connected. In this paper, the graph g is assumed undirected.
Lemma 1
([39]). For any ζ , ψ R n , and W > 0 , the following inequality holds:
2 ζ T ψ ζ T W ζ + ψ T W 1 ψ .
Lemma 2
([28]). Let α 1 , α 2 , , α n 0 , 0 < q 1 , and p 1 . The following inequalities hold:
n 1 q i = 1 n α i q i = 1 n α i q i = 1 n α i q .
n 1 p i = 1 n α i p i = 1 n α i p i = 1 n α i p .
Definition 1
([40]). (QUAD condition) The function f ( · ) is QUAD, if for any ζ R m and ψ R m , there exists P R m × m , H R m × m , and β > 0 such that
( ζ ψ ) T p [ f ( ζ ) f ( ψ ) ] ( ζ ψ ) T H ( ζ ψ ) β ( ζ ψ ) T ( ζ ψ ) .

2.2. Fractional Calculus

Definition 2
([16]). For an integrable function f : [ 0 , + ] R , the Riemann–Liouville fractional integral of order ϖ > 0 is defined by:
t c I 0 ϖ f ( t ) = 1 Γ ( ϖ ) 0 t f ( θ ) ( t θ ) 1 ϖ d θ ,
where Γ ( z ) = 0 e t t z 1 d t is Gamma function.
Definition 3
([16]). The Caputo’s fractional derivative of order ϖ > 0 for f C n ( [ 0 , + ) , R ) is defined by
t c D 0 ϖ f ( t ) = 1 Γ ( n ϖ ) 0 t f ( n ) ( θ ) ( t θ ) ϖ n + 1 d θ ,
where n N + and ϖ ( n 1 , n ) . Particularly, ϖ ( 0 , 1 ) , t c D 0 ϖ f ( t ) = 1 Γ ( 1 ϖ ) 0 t f ( θ ) ( t θ ) ϖ d θ .
In the following, D ϖ f ( t ) represents t c D 0 ϖ f ( t ) .
Property 1.
Let C ˜ , c 0 , and c 1 be any constants. Then,
( i ) D ϖ C ˜ = 0 ; ( i i ) D ϖ ( c 0 f ( t ) ± c 1 g ( t ) ) = c 0 D ϖ f ( t ) ± c 1 D ϖ g ( t ) .
Lemma 3
([39]). Let x : [ 0 , + ) R n be a continuously differentiable function, and H R n × n > 0 , then
D ϖ x T ( t ) H x ( t ) 2 x T ( t ) H D ϖ x ( t ) .
Lemma 4
([39]). If functions φ : R R , ξ : [ 0 , + ) R are continuously differentiable, and φ is convex on R. Then, for any t 0 , we obtain
D ϖ φ ( ξ ( t ) ) d φ d ξ D ϖ ξ ( t ) .
Lemma 5
([17]). Let v R be a continuously differentiable function on [ 0 , + ] , ϖ ( 0 , 1 ) , μ > 0 and d 0 . If, for any t 0 , D ϖ v ( t ) μ v ( t ) + d holds, then
v ( t ) v ( 0 ) E ϖ ( μ t ϖ ) + d ψ μ , t 0 ,
where ψ = m a x { 1 , C } is constant, C is defined as in [28], and E ϖ ( z ) is the Mittag–Leffler function, E ϖ ( z ) = k = 0 z k Γ ( ϖ , k + 1 ) , ϖ > 0 is constant, and z is a complex variable.
Definition 4.
Let ϖ ( 0 , 1 ) , if there exist constants ϵ > 0 , μ > 0 , γ > 0 , and k * >0, such that
y ( t ) ϵ E ϖ ( μ t ϖ ) γ + k * , t 0 ,
then y ( t ) is said to be Mittag–Leffler convergent to k * .
Lemma 6.
Let ϖ ( 0 , 1 ) . If y ( t ) : [ 0 , + ) R m is continuously differentiable on any compact interval of [ 0 , + ) , V ( y ( t ) ) is C-regular and v ( t ) = V ( y ( t ) ) . If there exist constants ϵ > 0 , μ > 0 , γ > 0 , and d 0 , for any t 0 satisfying
( i ) 0 ϵ y ( t ) γ v ( t ) ; ( i i ) D ϖ v ( t ) μ v ( t ) + d ,
then y ( t ) is said to be Mittag–Leffler convergent to k * , where k * = φ V ( y ( 0 ) ) d ϵ μ 1 γ .
Proof. 
On the basis of condition (ii) and Lemma 6, it yields that
v ( t ) v ( 0 ) E ϖ ( μ t ϖ ) + d ψ μ , t 0 .
Combined with condition (i) and the above-mentioned inequality, we obtain
y ( t ) V ( y ( 0 ) ) ϵ 1 γ E ϖ ( μ t ϖ ) + d ψ μ 1 γ , t 0 .
Applying Lemma 2, we have
y ( t ) V ( y ( 0 ) ) ϵ 1 γ φ E ϖ ( μ t ϖ ) 1 γ + k * , t 0 ,
where φ = max { 1 , 2 1 γ γ } . Definition 4 shows y ( t ) is Mittag–Leffler convergent to k * . The proof is completed. □

2.3. Problem Formulation

Consider the MASs consisting of one leader and N followers. The dynamics of each follower i can be described by the following second-order differential equations:
D ϖ p i ( t ) = v i ( t ) , D ϖ v i ( t ) = f ( v i ( t ) ) + u i ( t ) ,
where ϖ ( 0 , 1 ) , for i = 1 , 2 , , N , p i ( t ) = ( p i 1 ( t ) , , p i m ( t ) ) T R m and v i ( t ) = ( v i 1 ( t ) , , v i m ( t ) ) T R m denote the position and velocity of ith-follow at time t, respectively; u i ( t ) = ( u i 1 ( t ) , , u i m ( t ) ) T R m represents the control input; the nonlinear mapping f ( v i ( t ) ) : R m R m depicts the inherent dynamics of follower i.
The dynamics of the leader is formulated as
D ϖ p 0 ( t ) = v 0 ( t ) , D ϖ v 0 ( t ) = f ( v 0 ( t ) ) ,
where p 0 ( t ) = ( p 01 ( t ) , , p 0 m ( t ) ) T R m and v 0 ( t ) = ( v 01 ( t ) , , v 0 m ( t ) ) T R m are the position and velocity of ith-leader at time t; f ( v 0 ( t ) ) : R m R m depicts the inherent dynamics of leader.
In order to obtain the main results, we made the assumptions as follows:
Assumption A1.
The undirected network topology of g is connected.
Assumption A2.
f ( · ) is QUAD.
For systems (1) and (2), a desired geometric formation tracking vector is specified by = ( 1 , 2 , , N ) T . To achieve the desired formation between follows and leader, define error state as ξ i ( t ) = x i ( t ) x 0 ( t ) i , where x i ( t ) = [ p i ( t ) , v i ( t ) ] T , x 0 ( t ) = [ p 0 ( t ) , v 0 ( t ) ] T , i = [ h i , 0 ] T ; furthermore, we obtain
D ϖ ξ i ( t ) = A ξ i ( t ) + B u i ( t ) + B f ( v ˜ i ( t ) ) ,
where f ( v ˜ i ( t ) ) = f ( v i ( t ) ) f ( v 0 ( t ) ) , and A = 0 m I m 0 m 0 m , B = 0 m I m T .
Definition 5.
Given a desired geometric formation, i = [ h i , 0 ] T . Under control protocol u i ( t ) , if for i = 1 , 2 , , N ,
lim t p i ( t ) p 0 ( t ) h i = 0 , lim t v i ( t ) v 0 ( t ) = 0 ,
holds, then systems (1) and (2) are said to realize the desired formation.
Remark 1.
In Definition 5, i stands for the relative offset vector between x i ( t ) and x 0 ( t ) , if i = 0 , then systems (1) and (2) are said to realize the consensus tracking.
Definition 6.
Under control protocol u i ( t ) , i = 1 , 2 , , N , if there exist constants ϵ > 0 , μ > 0 , γ > 0 and k * > 0 , such that
x i ( t ) x 0 ( t ) i ϵ E ϖ ( μ t ϖ ) γ + k * , t 0 ,
then systems (1) and (2) are called to realize the global Mittag–Leffler bounded formation.

3. Main Results

In this section, we presented two distributed protocols based on event-triggered mechanism to achieve desired formation. In addition, Zeno behavior is excluded for designed event-triggered control scheme. Moreover, the executive algorithm in regard to protocol is proposed.
Denote a triggering instants sequence of agent i as { t 0 i , t 1 i , , t k i , t k + 1 i , } , which is determined by the triggering function. Let state information p ^ i ( t ) = p i ( t k i ) , v ^ i ( t ) = v i ( t k i ) , where t [ t k i , t k + 1 i ) . Denote x ^ i ( t ) = [ p ^ i ( t ) , v ^ i ( t ) ] T , and ξ ^ i ( t ) = [ p ^ i ( t ) p ^ 0 ( t ) i , v ^ i ( t ) v ^ 0 ( t ) ] T .
Denote the state measurement errors of follower and leader, respectively,
e i ( t ) = x ^ i ( t ) x i ( t ) = [ p ^ i ( t ) p i ( t ) , v ^ i ( t ) v i ( t ) ] T , e 0 ( t ) = x ^ 0 ( t ) x 0 ( t ) = [ p ^ 0 ( t ) p 0 ( t ) , v ^ 0 ( t ) v 0 ( t ) ] T .
Furthermore, we denote
Π i ( t ) = ( x ^ i ( t ) x ^ 0 ( t ) i ) ( x i ( t ) x 0 ( t ) i ) = ξ ^ i ( t ) ξ i ( t ) = e i ( t ) e 0 ( t ) .

3.1. Global Mittag–Leffler Formation with Event-Triggered Protocol

In this subsection, the global Mittag–Leffler bounded formation of systems (1) and (2) is discussed under the proposed control protocol based on predefined ETCS, and the formation condition is derived in terms of linear matrix inequalities (LMIs). In addition, Zeno behavior is excluded.
The distributed ETCS for i t h agent is designed as
u i ( t ) = K 1 j N i a i j ( ξ ^ i ( t ) ξ ^ j ( t ) ) + b i ξ ^ i ( t ) ,
where K 1 R m × 2 m is the feedback gain matrices to be determined later, and the triggering instant sequence t k i of the i t h agent will be determined by the following event-triggered condition
t k + 1 i = i n f { t : t > t k i , Π i ( t ) γ ξ i ( t ) ϵ i > 0 } ,
where γ > 0 is a threshold parameter, and ϵ i > 0 . Figure 1 shows a schematic of the designed ETCS protocol.
Using (4)–(6), we obtain
D ϖ ξ i ( t ) = A ξ i ( t ) + B f ( v ˜ i ( t ) ) B K 1 j N i a i j ( ξ ^ i ( t ) ξ ^ j ( t ) ) + b i ξ ^ i ( t ) = A ξ i ( t ) + B f ( v ˜ i ( t ) ) B K 1 j N i a i j ( Π i ( t ) + ξ i ( t ) ) ( Π j ( t ) + ξ j ( t ) ) + b i ( Π i ( t ) + ξ i ( t ) ) = A ξ i ( t ) + B f ( v ˜ i ( t ) ) B K 1 j N i a i j ( ξ i ( t ) ξ j ( t ) ) + b i ξ i ( t ) B K 1 j N i a i j ( Π i ( t ) Π j ( t ) ) + b i Π i ( t ) .
Set ξ ( t ) = ( ξ 1 T ( t ) , ξ 2 T ( t ) , , ξ N T ( t ) ) T ,   Π ( t ) = ( Π 1 T ( t ) , Π 2 T ( t ) , , Π N T ( t ) ) T ,   f ( v ˜ ( t ) ) = ( f T ( v ˜ 1 ( t ) ) , f T ( v ˜ 2 ( t ) ) , , f T ( v ˜ N ( t ) ) ) T . Furthermore, the error system (7) can be written as
D ϖ ξ ( t ) = ( I N A ) ξ ( t ) + ( I N B ) f ( v ˜ ( t ) ) ( H B K 1 ) ξ ( t ) ( H B K 1 ) Π ( t ) .
Theorem 1.
Suppose that Assumptions 1 and 2 hold, and ϖ ( 0 , 1 ) . If there exist scalars α > 0 , β > 0 and γ > 0 , matrices Q 1 > 0 , W 1 and K 1 , such that
Ξ = I N Q 1 A + A T Q 1 2 + W 1 β I m + γ 2 2 α I 2 N m + H Q 1 B K 1 + K 1 T B T Q 1 + α Q 1 B K 1 K 1 T B T Q 1 2 < 0
holds, then FMASs (1) and (2) can realize the global Mittag–Leffler bounded formation under designed protocol (5) with (6).
Proof. 
Consider the following candidate Lyapunov function:
V ( t ) = 1 2 ξ T ( t ) ( I N Q 1 ) ξ ( t ) .
For t [ t k , t k + 1 ) , according to Lemma 3, the Caputo’s fractional derivative of V ( t ) along of the trajectories of error system (8) is calculated as
D ϖ V ( t ) ξ T ( t ) I N Q 1 A + A T Q 1 2 ξ ( t ) ξ T ( t ) H Q 1 B K 1 + K 1 T B T Q 1 2 ξ ( t ) + ξ T ( t ) ( I N Q 1 B ) f ( v ˜ ( t ) ) ξ T ( t ) ( H Q 1 B K 1 ) Π ( t ) .
According to the Assumption 2 that f ( · ) is QUAD, we obtain
ξ T ( t ) ( I N Q 1 B ) f ( v ˜ ( t ) ) ξ T ( t ) ( I N ( W 1 β I 2 m ) ) ξ ( t )
By Lemma 1, we obtain
ξ T ( t ) ( H Q 1 B K 1 ) Π ( t ) α 2 ξ T ( t ) ( H Q 1 B K 1 K 1 T B T Q 1 ) ξ ( t ) + 1 2 α Π ( t ) T Π ( t ) .
Substituting (6), and (10) to (13), it yields that
D ϖ V ( t ) ξ T ( t ) [ I N Q 1 A + A T Q 1 2 + W 1 β I 2 m + 1 2 α Π T ( t ) Π ( t ) + H Q 1 B K 1 + K 1 T B T Q 1 + α Q 1 B K 1 K 1 T B T Q 1 2 ] ξ ( t ) μ V ( t ) + ϱ ,
where μ = 2 λ min ( Ξ ) λ max ( Q 1 ) , and ϱ = max 1 i N { ϵ i 2 α } . By utilizing Lemma 6, it can derive
ξ ( t ) 2 V ( 0 ) λ m i n ( Q 1 ) 1 2 E ϖ ( μ t ϖ ) 1 2 + 2 V ( 0 ) ϱ λ m i n ( Q 1 ) μ ,
where V ( 0 ) = 1 2 ξ T ( 0 ) ( I N Q 1 ) ξ ( 0 ) . According to Definition 6, it shows that the global Mittag–Leffler bounded formation of FMASs (1) and (2) is realized. The proof is completed. □
As is known to all, “Zeno behavior” means that the limitless number of event-triggering times is proceeded in finite time, it causes the ETCS protocol to be invalid. Consequently, the following theorem is to verify that the intervals between any two event-triggering instants are lower-bound.
Theorem 2.
For FMASs (1) and (2), under the scheme (5), the Zeno behavior can be excluded.
Proof. 
According to Theorem 1, we can obtain that D ϖ ξ i ( t ) is bounded. Hence, for t [ t k i , t k + 1 i ) , there is a positive scalar π , such that D ϖ ξ i ( t ) π . Because of ξ i ( t ) = x i ( t ) x 0 ( t ) i , and Π i ( t ) = ξ ^ i ( t ) ξ i ( t ) , we have Π i ( t k ) = 0 and D ϖ Π ( t ) = D ϖ ξ ( t ) . Thus, we also derive
Π ( t ) = Π ( t ) Π ( t k ) = D t k ϖ D t ϖ Π ( t ) = 1 Γ ( ϖ ) t k i t ( t θ ) ϖ 1 D ϖ Π ( θ ) d θ = 1 Γ ( ϖ ) t k i t ( t θ ) ϖ 1 D ϖ ξ ( θ ) d θ 1 Γ ( ϖ ) t k i t ( t θ ) ϖ 1 D ϖ ξ ( θ ) d θ π ( t t k i ) ϖ Γ ( ϖ + 1 ) .
In line with event-triggered condition (6), when t = t k + 1 i , it is easy to derive that Π i ( t k + 1 i ) > γ ξ i ( t k + 1 i ) + ϵ i . Furthermore, it follows from (15) that γ ξ i ( t k + 1 i ) + ϵ i < π ( t k + 1 i t k i ) ϖ Γ ( ϖ + 1 ) . If ξ i ( t k + 1 i ) = 0 , then 0 < ( Γ ( ϖ + 1 ) ϵ i π ) 1 ϖ < t k + 1 i t k i . If ξ i ( t k + 1 i ) 0 , then 0 < ( Γ ( ϖ + 1 ) ( γ ξ i ( t k + 1 i ) + ϵ i ) π ) 1 ϖ < t k + 1 i t k i . Therefore, we can draw the conclusion that Zeno behavior is excluded. The proof is completed. □

3.2. Global Mittag–Leffler Bounded Formation with Adaptive Event-Triggered Protocol

In this subsection, the global Mittag–Leffler bounded formation is discussed under an adaptive protocol based on ETCS. In addition, Zeno behavior is excluded.
We consider the following adaptive ETCS formation protocol:
u i ( t ) = K 2 j N i c i j ( t ) a i j ξ ^ i ( t ) ξ ^ j ( t ) + c i ( t ) b i ξ ^ i ( t ) , D ϖ c i j ( t ) = a i j ξ ^ i ( t ) ξ ^ j ( t ) T Λ ξ ^ i ( t ) ξ ^ j ( t ) + 1 c i j ( t ) , D ϖ c i ( t ) = b i ξ ^ i ( t ) T Λ ξ ^ i ( t ) + 1 c i ( t ) ,
where K 2 R m × 2 m and Λ R 2 m × 2 m are the feedback gain matrices, c i j ( t ) , c i ( t ) are the adaptive coupling weights with c i j ( 0 ) = c j i ( 0 ) > 0 , c i ( 0 ) > 0 , k 1 , k 2 are positives satisfying that c 1 < c i j ( 0 ) , c 2 < c i ( 0 ) .
The triggering instant sequence t k i of the i t h agent will be determined iteratively by the following trigger function g i ( · )
t k + 1 i = i n f t > t k i : g i Π i ( t ) , ξ ^ i j ( t ) , c i ( t ) , c i j ( t ) > 0 ,
where ξ ^ i j ( t ) = ξ ^ i ( t ) ξ ^ j ( t ) . The triggering function in triggering mechanisms (17) is designed as g i ( · ) = Φ i Ψ i ε i , thereinto ε i > 0 , and
Φ i = i = 1 N j N i 2 c 1 a i j + 2 c i ( t ) c 2 b i Λ Π i ( t ) 2 + 2 i = 1 N j N i c i j ( t ) c 1 a i j ξ ^ i ( t ) ξ ^ j ( t ) T Λ Π i ( t ) , Ψ i = i = 1 N j N i c i j ( t ) c 1 2 a i j ξ ^ i ( t ) ξ ^ j ( t ) T Λ ξ ^ i ( t ) ξ ^ j ( t ) .
Remark 2.
It is worth noting that, if the adaptive coupling weight c i j ( t ) and c i ( t ) in (16) and (17) are constants, then determination of these scalar gains requires global information of the Laplacian matrix. Hence, in this paper, c i j ( t ) and c i ( t ) are introduced, which are adaptive rather than being prefixed.
For the i t h follower, substituting the control protocol (17) into the error system (3), it yields that
D ϖ ξ i ( t ) = A ξ i ( t ) + B f ( v ˜ i ( t ) ) B K 2 j N i c i j ( t ) a i j ξ ^ i ( t ) ξ ^ j ( t ) + c i ( t ) b i ξ ^ i ( t ) = A ξ i ( t ) + B f ( v ˜ i ( t ) ) B K 2 [ j N i c i j ( t ) a i j ( ( Π i ( t ) + ξ i ( t ) ) ( Π j ( t ) + ξ j ( t ) ) ) + c i ( t ) b i ( Π i ( t ) + ξ i ( t ) ) ] = A ξ i ( t ) + B f ( v ˜ i ( t ) ) B K 2 c i ( t ) b i Π i ( t ) + ξ i ( t ) B K 2 j N i c i j ( t ) a i j ( ξ i ( t ) ξ j ( t ) + Π i ( t ) Π j ( t ) ) .
Theorem 3.
Suppose that Assumptions 1 and 2 hold, and ϖ ( 0 , 1 ) . If there exist scalars c 1 , c 2 , and β > 0 , matrices Q 2 > 0 , W 1 , and K 2 , such that
Θ = I N Q 2 A + A T Q 2 + 2 ( W 1 β I 2 m ) c 1 L + c 2 D Λ 0 ,
holds, then FMASs (1) and (2) can realize the global Mittag–Leffler bounded formation under designed adaptive protocol (16) with ETCS (17).
Proof. 
Consider the following candidate Lyapunov function:
V ( t ) = i = 1 N ξ i ( t ) T Q 2 ξ i ( t ) + i = 1 N j N i c i j ( t ) c 1 2 4 + i = 1 N c i ( t ) c 2 2 4 .
For t [ t k , t k + 1 ) , by employing Lemmas 3 and 4, the Caputo’s fractional derivative of V ( t ) is listed as
D ϖ V ( t ) 2 i = 1 N ξ i ( t ) T Q 2 D ϖ ξ i ( t ) + i = 1 N ( c i ( t ) c 2 ) 2 D ϖ c i ( t ) + i = 1 N j N i ( c i j ( t ) c 1 ) 2 D ϖ c i j ( t ) .
It follows from (23) that
2 i = 1 N ξ i ( t ) T Q 2 D ϖ ξ i ( t ) = i = 1 N ξ i T ( t ) Q 2 A + A T Q 2 ξ i ( t ) + 2 i = 1 N ξ i T ( t ) ( Q 2 B ) f ( v i ˜ ( t ) ) i = 1 N j N i c i j ( t ) a i j ( ξ i ( t ) ξ j ( t ) ) T Λ ( ξ i ( t ) ξ j ( t ) )
i = 1 N j N i c i j ( t ) a i j ( ξ i ( t ) ξ j ( t ) ) T Λ ( Π i ( t ) Π j ( t ) ) 2 i = 1 N c i ( t ) b i ξ i T ( t ) Λ ξ i ( t ) 2 i = 1 N c i ( t ) b i ξ i T ( t ) Λ Π i ( t ) ,
where Λ = Q 2 B K 2 + K 2 T B T Q 2 2 . Based on (16), it can be derived that
i = 1 N j N i ( c i j ( t ) c 1 ) 2 D ϖ c i j ( t ) = i = 1 N j N i ( c i j ( t ) c 1 ) 2 a i j ( ξ i ( t ) ξ j ( t ) ) T Λ ( ξ i ( t ) ξ j ( t ) ) + i = 1 N j N i ( c i j ( t ) c 1 ) 2 a i j ( Π i ( t ) Π j ( t ) ) T Λ ( Π i ( t ) Π j ( t ) ) + i = 1 N j N i ( c i j ( t ) c 1 ) a i j ( ξ i ( t ) ξ j ( t ) ) T Λ ( Π i ( t ) Π j ( t ) ) i = 1 N j N i ( c i j ( t ) c 1 ) ( c i j ( t ) 1 ) 2 .
In addition, by use of (16), we also obtain
i = 1 N ( c i ( t ) c 2 ) 2 D ϖ c i ( t ) = i = 1 N ( c i ( t ) c 2 ) 2 b i ξ i ( t ) + Π i ( t ) T Λ ξ i ( t ) + Π i ( t ) i = 1 N ( c i ( t ) c 2 ) ( c i ( t ) 1 ) 2 i = 1 N c i ( t ) c 2 b i ξ i T ( t ) Λ ξ i ( t ) + i = 1 N c i ( t ) c 2 b i Π i T ( t ) Λ Π i ( t ) i = 1 N c i ( t ) c 2 c i ( t ) 1 2 .
Based on Lemma 1, it yields that
2 i = 1 N c i ( t ) b i ξ i T ( t ) Λ Π i ( t ) i = 1 N c i ( t ) b i ξ i T ( t ) Λ ξ i ( t ) + i = 1 N c i ( t ) b i Π i T ( t ) Λ Π i ( t ) .
Form (12), we have
2 i = 1 N ξ i T ( t ) ( Q 2 B ) f ( v i ˜ ( t ) ) 2 i = 1 N ξ i T ( t ) ( W 1 β I 2 m ) ξ i ( t ) .
Based on the above calculations, we obtain
D ϖ V ( t ) i = 1 N ξ i T ( t ) Q 2 A + A T Q 2 + 2 ( W 1 β I 2 m ) ξ i ( t ) i = 1 N j N i c i j ( t ) + c 1 2 a i j ξ i ( t ) ξ j ( t ) T Λ ( ξ i ( t ) ξ j ( t ) ) i = 1 N j N i c 1 a i j ( ξ i ( t ) ξ j ( t ) ) T Λ ( Π i ( t ) Π j ( t ) ) + i = 1 N j N i c i j ( t ) c 1 2 a i j ( Π i ( t ) Π j ( t ) ) T Λ ( Π i ( t ) Π j ( t ) )
+ i = 1 N ( 2 c i ( t ) c 2 ) b i Π i T ( t ) Λ Π i ( t ) i = 1 N c 2 b i ξ i T ( t ) Λ ξ i ( t ) i = 1 N j N i ( c i j ( t ) c 1 ) ( c i j ( t ) 1 ) 2 i = 1 N ( c i ( t ) c 2 ) ( c i ( t ) 1 ) 2 .
In light of Lemma 1, we can obtain
i = 1 N j N i c 1 a i j ( ξ i ( t ) ξ j ( t ) ) T Λ ( Π i ( t ) Π j ( t ) ) i = 1 N j N i c 1 2 a i j ( ξ i ( t ) ξ j ( t ) ) T Λ ( ξ i ( t ) ξ j ( t ) ) + i = 1 N j N i c 1 2 a i j ( Π i ( t ) Π j ( t ) ) T Λ ( Π i ( t ) Π j ( t ) ) .
According to expression (4), we have
i = 1 N j N i c i j ( t ) c 1 2 a i j ( Π i ( t ) Π j ( t ) ) T Λ ( Π i ( t ) Π j ( t ) ) = i = 1 N j N i c i j ( t ) c 1 2 a i j x ^ i ( t ) x ^ j ( t ) ( i j ) T Λ x ^ i ( t ) x ^ j ( t ) ( i j ) + i = 1 N j N i ( c i j ( t ) c 1 ) a i j ( x ^ i ( t ) x ^ j ( t ) ( i j ) T Λ ( Π i ( t ) Π j ( t ) ) + i = 1 N j N i c i j ( t ) c 1 2 a i j ( ξ i ( t ) ξ j ( t ) ) T Λ ( ξ i ( t ) ξ j ( t ) ) .
It is easy to obtain
( c i j ( t ) c 1 ) ( c i j ( t ) 1 ) 2 ( c i j ( t ) c 1 ) 2 4 + ( c 1 1 ) 2 4 , ( c i ( t ) c 1 ) ( c i ( t ) 1 ) 2 ( c i ( t ) c 1 ) 2 4 + ( c 2 1 ) 2 4 .
Substituting (24) and (25) into (23), we can derive
D ϖ V ( t ) ξ T ( t ) I N Q 2 A + A T Q 2 + 2 ( W 1 β I 2 m ) c 1 L + c 2 D Λ ξ ( t ) + ( c 1 1 ) 2 4 + ( c 2 1 ) 2 4 + i = 1 N j N i 2 c 1 a i j + ( 2 c i ( t ) c 2 ) b i Π i ( t ) T Λ Π i ( t ) + 2 i = 1 N j N i ( c i j ( t ) c 1 ) a i j ξ ^ i ( t ) ξ ^ j ( t ) T Λ Π i ( t ) i = 1 N j N i c i j ( t ) c 1 2 a i j ξ ^ i ( t ) ξ ^ j ( t ) T Λ ξ ^ i ( t ) ξ ^ j ( t ) μ V ( t ) + g i ( Π i ( t ) , X i j ( t ) , c i ( t ) , c i j ( t ) ) + k 3 μ V ( t ) + k 3 ,
where μ = m i n { λ m a x ( Θ ) λ m i n ( Q 2 ) , 1 } , k 3 = ( c 1 1 ) 2 4 + ( c 2 1 ) 2 4 + σ , σ = max 1 i N { ε i } . Apply Lemma 5, we can obtain
ξ ( t ) V ( 0 ) λ m i n ( Q 2 ) 1 2 E ϖ ( μ t ϖ ) + k 3 ψ μ 1 2 V ( 0 ) λ m i n ( Q 2 ) 1 2 E ϖ ( μ t ϖ ) 1 2 + k 3 ψ μ 1 2 ,
where V ( 0 ) = i = 1 N ξ i ( 0 ) T Q 2 ξ i ( 0 ) + i = 1 N j N i ( c i j ( 0 ) c 1 ) 2 4 + i = 1 N ( c i ( 0 ) c 2 ) 2 4 . According to Definition 6, it implies that FMASs (1) and (2) can achieve the Mittag–Leffler bounded formation under designed control protocol (16) with the ETCS (17). The proof is completed. □
Theorem 4.
For FMASs (1) and (2), under the control scheme (16), Zeno behavior is avoided.
Proof. 
According to Theorem 3, we obtain that D ϖ ξ i ( t ) is bounded. Hence, for t [ t k i , t k + 1 i ) , there has positive scalar π , such that D ϖ ξ i ( t ) 1 D ϖ ξ i ( t ) 1 π , which utilizes the fact that D ϖ | f ( t ) | sign ( f ( t ) ) D ϖ f ( t ) . According to Definition 2, we can obtain ξ i ( t ) 1 π ( t t k i ) ϖ Γ ( ϖ ) .
In light of the the triggering function in triggering mechanisms (17), when t = t k + 1 i , we have
i = 1 N j N i 2 c 1 a i j + 2 c i ( t ) c 2 b i Λ Π i ( t ) 2 + 2 i = 1 N j N i c i j ( t ) c 1 a i j ξ ^ i ( t ) ξ ^ j ( t ) T Λ Π i ( t ) > i = 1 N j N i c i j ( t ) c 1 2 a i j ξ ^ i ( t ) ξ ^ j ( t ) T Λ ξ ^ i ( t ) ξ ^ j ( t ) + ε i > ε i .
In addition,
i = 1 N j N i 2 c 1 a i j + 2 c i ( t ) c 2 b i Λ Π i ( t ) 2 + 2 i = 1 N j N i c i j ( t ) c 1 a i j ξ ^ i ( t ) ξ ^ j ( t ) T Λ Π i ( t ) i = 1 N j N i 2 | 2 c 1 a i j + 2 c i ( t ) c 2 b i | Λ ξ i ( t ) 1 2 + 8 i = 1 N j N i | c i j ( t ) c 1 a i j | ξ i ( t ) 1 4
Because the adaptive coupling weight c i ( t ) and c i j ( t ) will have convergent constants, then | 2 c 1 a i j + 2 c i ( t ) c 2 b i | and | ( c i j ( t ) c 1 ) a i j | are constants. Let τ = max 1 i , j N { | 2 c 1 a i j + 2 c i ( t ) c 2 b i | } and ϑ = max 1 i , j N { | ( c i j ( t ) c 1 ) a i j | } . Furthermore, combining with
ξ i ( t k + 1 i ) 1 π ( t k + 1 i t k i ) ϖ Γ ( ϖ ) and (3.24), we have ε i < 2 N Λ π ( t k + 1 i t k i ) 2 ϖ Γ ( ϖ ) + 8 N Λ π ( t t k i ) 4 ϖ Γ ( ϖ ) < 10 N Λ π ( t k + 1 i t k i ) 4 ϖ Γ ( ϖ ) . Hence, it yields that t k + 1 i t k i > ( ε i Γ ( ϖ ) 10 N Λ ) 1 4 ϖ > 0 . This implies that Zeno behavior is excluded in Theorem 3. The proof is completed. □
Remark 3.
In the designed control protocol (5), the control gain K 1 and triggering condition parameter γ > 0 are required to satisfy condition (9). Because the term W 1 β I m may be negative, then K 1 does not need to be large. In the designed control protocol (5), the control gains K 2 and Λ are applied to satisfy inequality condition in Theorem 3. It should be pointed out that adaptive ETCS means that coupling weight is adaptively adjusted with error state ξ ^ i . The gain K 2 is still determined from precisely known agent dynamics, which is not adaptive.
Remark 4.
In the existing works [27,28,29,30,31], the triggering function is designed as state-dependent that is h ( · ) = Π i ( t ) γ ξ i ( t ) . It is worth noting that this may lead to some limitations, such as the requirement on continuous communication and occurrence of Zeno behavior. To circumvent this drawback, some scholars proposed a state-independent triggering function [41], i.e., h ( · ) = Π i ( t ) a i e b i t c i . However, the triggering function does not include the information from the system states, which would lead to the change of the system performance. For the design of the distributed event-triggered scheme, how to avoid Zeno behavior while ensuring control performance is a challenge. In this paper, constants ϵ i and ε i are introduced into triggering conditions (6) and (17) to address this problem, respectively.

4. Process of the Event-Triggered Scheme

In this section, we present the workflow description of the ETCS executive process.
Event-triggered protocol execution:
Step 1: For i = 1 , 2 , , N , choose the desired information of formation i .
Step 2: if b i > 0 , apply the state information of leader p 0 ( t ) and v 0 ( t ) .
Step 3: if function g i ( · ) 0 , share its state information of position p i ( t k + 1 i )
and velocity v i ( t k + 1 i ) , moreover including triggered instant t k + 1 i .
Step 4: update state information p ^ i ( t ) , v ^ i ( t ) and control input signal.
Step 5: if updated state information p ^ i ( t ) and v ^ i ( t ) are received from their neighbors,
then update the state information p ^ j ( t ) , v ^ j ( t ) and control input signal.

5. Numerical Simulations

In this section, to validate the correctness of the proposed results, two simulation examples are given. The efficiency of distributed event-triggered protocol and adaptive event-triggered scheme is illustrated in Examples 1 and 2, respectively.
Example 1.
The second-order FMASs with QUAD inherent dynamics is employed to simulate a traffic scenario in the rough sand, which consists of three followers labeled 1–3 and a leader labeled 0. Suppose that each agent denotes a robot, where leader is called as a guidance robot. Our objective is that multiple autonomous robots finally shape a formation pattern of a triangle. Figure 2 shows the corresponding topologly structure.
Moreover, let e i = p i ( t ) p 0 ( t ) h i and E i = v i ( t ) v 0 ( t ) are the position error and velocity error between leader and followers i.
According to Figure 2, the weighted adjacency matrix of this system is:
A = 0 0.5 1 0.5 0 1 1 1 0 .
The weight of communication between leaders and followers D = diag { 1.5 , 1.5 , 0 } , and parameter ϖ = 0.98 .
Select the dynamic function f i ( v i ) = f i 1 ( v i 1 ) f i 2 ( v i 2 ) = 1 2 ( | v i 1 + 1 | | v i 1 1 | ) 1 2 ( | v i 2 + 1 | | v i 2 1 | ) , it is easy to check that Assumption 2 holds. Let scalars μ = 0.86 , α = 0.25 , β = 1.07 , γ = 1.58 , ϵ 1 = 2.04 , ϵ 2 = 1.879 , and ϵ 3 = 2.23 . Set the predesigned formation compensation vector as: h 1 = ( h 11 , h 12 ) T = ( 1.90 , 0.45 ) T ,   h 2 = ( h 21 , h 22 ) T = ( 1.20 , 1.00 ) T ,   h 3 = ( h 31 , h 32 ) T = ( 0.30 , 0.40 ) T .
For protocol (5), select the control gain matrix K 1 = 4.67 1.89 3.23 8.78 2.46 1.77 2.30 4.42 .
According to inequality (9), the following matrixes are derived:
Q 1 = 4.29 1.98 3.34 4.65 3.33 7.47 2.16 4.44 3.56 2.11 1.98 4.65 0.76 3.59 1.87 3.56 , W 1 = 3.98 1.96 1.55 0.83 2.69 0.41 1.09 2.55 2.78 4.27 1.66 1.00 0.12 2.54 1.83 5.21 .
The triggering interval of the three followers under the triggering function (6) is shown in Figure 3; it can be seen that there is no Zeno behavior occurs. The trajectories of control input are shown in Figure 4. Figure 5 shows the formation tracking errors of ξ i 1 and ξ i 2 within 6 s. From Figure 5, it can be found that errors ξ i 1 and ξ i 2 asymptotically approach 0. Figure 6 shows the formation of leader and followers at different times, and they finally perform and maintain an obtuse triangle formation. Thus, it can be verified that, under the event-triggered strategy (6), the control protocol (5) for the shape of the desired formation is effective.
Example 2.
Consider a second-order FMASs with QUAD inherent dynamics, which consists of 4 followers labeled 1–4 and a leader labeled 0. Figure 7 shows the corresponding topology. Moreover, let e i = p i ( t ) p 0 ( t ) h i and E i = v i ( t ) v 0 ( t ) are the position error and velocity error between leader and followers i.
According to Figure 6, the weighted adjacency matrix of this system is
A = 0 1.5 0 0 1.5 0 1 0 0 1 0 1.5 0 0 1.5 0 .
The weight of communication between leaders and followers D = diag { 1 , 0 , 0 , 1 } , and parameter ϖ = 0.98 . Select the dynamic function f i ( v i ) = 0 1 1 1 v i + 0 sign ( v i 1 ) = v i 2 v i 2 v i 1 + sign ( v i 1 ) , it is easy to check that Assumption 2 holds. Let scalars c 1 = 0.17 , c 2 = 0.48 , β = 1.33 , ε 1 = 1.79 , ε 2 = 1.58 and ε 3 = 1.84 . Set the predesigned formation compensation vector as:
h 1 = ( h 11 , h 12 ) T = ( 2.5 , 1.5 ) T , h 2 = ( h 21 , h 22 ) T = ( 1.5 , 1.0 ) T , h 3 = ( h 31 , h 32 ) T = ( 2.1 , 1.5 ) T , h 4 = ( h 41 , h 42 ) T = ( 1.0 , 0.5 ) T .
For protocol (16), select the control gain matrixes
K 2 = 5.11 2.01 31.89 0.78 3.54 7.88 4.87 4.20 , Λ = 3.23 1.88 1.36 0.79 6.21 5.36 2.98 0.65 4.54 2.08 4.77 1.78 3.01 3.66 0.98 3.56 .
According to inequality condition, the following matrixes are derived:
Q 2 = 3.20 4.98 1.44 5.10 2.44 3.51 2.18 0.88 4.62 1.52 5.02 3.16 0.41 2.50 1.31 2.89 , W 2 = 0.34 0.98 1.20 5.11 2.76 0.44 1.02 2.35 3.70 4.22 3.64 2.00 2.12 3.26 2.66 2.12 .
The triggering interval of the four followers under the triggering function (17) is shown in Figure 8, it can be seen that there is no Zeno behavior occurs. Figure 9 describes the trajectories of control input (16), and the trajectories of adaptive coupling weight are displayed in Figure 10. From Figure 10, we can find that the adaptive coupling weight is convergent to constant. Figure 11 shows the formation tracking errors of ξ i 1 and ξ i 2 within 8 s, and we find errors ξ i 1 and ξ i 2 asymptotically approach 0. Figure 12 shows the formation of leader and followers at different times, and they perform and maintain a rectangle formation finally. Thus, it can be verified that, under the ETCS (17), the control protocol (16) for the shape of the desired formation is efficient.

6. Conclusions

This paper has disscussed the global Mittag–Leffler formation for FMASs with QUAD inherent dynamics. Two distributed control schemes based on event-triggered strategies have been proposed by utilizing local information from the neighbors. The global Mittag–Leffler (bounded) formation conditions have been obtained in the form of LMIs. Future research interests is to focus on the time-varying formation in finite/fixed time for FMASs.

Author Contributions

Conceptualization, Y.W. and H.W.; methodology, Y.W.; software, J.Z.; validation, Y.W., J.Z. and H.W.; formal analysis, H.W.; investigation, Y.W.; resources, H.W.; data curation, Y.W.; writing—original draft preparation, J.Z.; writing—review and editing, J.Z.; visualization, Y.W.; supervision, H.W.; project administration, H.W.; funding acquisition, H.W. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Natural Science Foundation of China (No. 12171416).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The authors would like to thank Editors and Reviewers for their insightful and constructive comments, which help to enrich the content and improve the presentation of the results in this paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Dusit, N.; Wang, P.; Walid, S.; Are, H. Controlled coalitional games for cooperative mobile social networks. IEEE Trans. Veh. Technol. 2011, 60, 1812–1824. [Google Scholar]
  2. Chen, X.; Gong, X.; Yang, L.; Zhang, J. Exploiting social tie structure for cooperative wireless networking: A social group utility maximization framework. IEEE-ACM Trans. Netw. 2016, 24, 3593–3606. [Google Scholar] [CrossRef]
  3. Wang, X.; Vivek, Y.; Balakrishnan, S. Cooperative UAV formation flying with obstacle/collision avoidance. IEEE Trans. Control Syst. Technol. 2007, 15, 672–679. [Google Scholar] [CrossRef]
  4. Hamed, R.; Farzaneh, A. A decentralized cooperative control scheme with obstacle avoidance for a team of mobile robots. IEEE Trans. Ind. Electron. 2014, 61, 347–354. [Google Scholar]
  5. Zhang, Z.; Wu, H. Cluster synchronization in finite/fixed time for semi-Markovian switching T-S fuzzy complex dynamical networks with discontinuous dynamic nodes. AIMS Math. 2022, 7, 11942–11971. [Google Scholar] [CrossRef]
  6. Xu, Y.; Zhao, S.; Luo, D.; You, Y. Affine formation maneuver control of high-order multi-agent systems over directed networks. Automatica 2020, 118, 109004. [Google Scholar] [CrossRef]
  7. Wei, L.; Chen, M.; Li, T. Dynamic event-triggered cooperative formation control for UAVs subject to time-varying disturbances. IET Control Theory Appl. 2020, 14, 2514–2525. [Google Scholar] [CrossRef]
  8. Zong, C.; Ji, Z.; Tian, L.; Zhang, Y. Distributed multi-robot formation control based on bipartite consensus with time-varying delays. IEEE Access 2019, 7, 144790–144798. [Google Scholar] [CrossRef]
  9. Liu, P.; Zhang, Q.; Yang, X.; Yang, L. Passivity and optimal control of descriptor biological complex systems. IEEE Trans. Autom. Control 2008, 53, 122–125. [Google Scholar] [CrossRef]
  10. Kiarash, A.; Selmic, R. Neuro-Adaptive formation control and target tracking for nonlinear multi-agent systems with time-delay. IEEE Control Syst. Lett. 2021, 5, 791–796. [Google Scholar]
  11. Mojtaba, R.; Beheshti, M.; Sadegh, B. Event-Based Formation Control of Networked Multi-Agent Systems Using Complex Laplacian Under Directed Topology. IEEE Control Syst. Lett. 2021, 5, 1085–1090. [Google Scholar]
  12. Liu, C.; Wu, X.; Mao, B. Formation tracking of second-order multi-agent systems with multiple leaders based on sampled data. IEEE Trans. Circuits Syst. II-Express Briefs 2020, 68, 331–335. [Google Scholar] [CrossRef]
  13. Hua, Y.; Dong, X.; Han, L.; Li, Q.; Ren, Z. Formation-containment tracking for general linear multi-agent systems with a tracking-leader of unknown control input. Syst. Control Lett. 2018, 122, 67–76. [Google Scholar] [CrossRef]
  14. Wang, R. Adaptive output-feedback time-varying formation tracking control for multi-agent systems with switching directed networks. J. Frankl. Inst.-Eng. Appl. Math. 2020, 357, 551–568. [Google Scholar] [CrossRef]
  15. Wang, J.; Xu, Y.; Xu, Y.; Yang, D. Time-Varying formation for high-order multi-agent systems with external disturbances by event-triggered integral sliding mode control. Appl. Math. Comput. 2019, 359, 333–343. [Google Scholar] [CrossRef]
  16. Podlubny, I. Fractional Differential Equations; Academic Press: San Diego, CA, USA, 1999. [Google Scholar]
  17. Bai, J.; Wu, H.; Cao, J. Secure synchronization and identification for fractional complex networks with multiple weight couplings under DoS attacks. Comput. Appl. Math. 2022, 41, 187. [Google Scholar] [CrossRef]
  18. Nehad, A.S.; Abderrahim, W.; Rasool, S.; Se-Jin, Y.; Bashir, S.; Yasir, M.; Kashif, H. Effects of fractional derivative and heat source/sink on MHD free convection flow of nanofluids in a vertical cylinder: A generalized Fourier’s law model. Case Stud. Therm. Eng. 2021, 28, 101518. [Google Scholar]
  19. Nehad, A.S.; Abderrahim, W.; Essam, R.E.; Thirupathi, T.; Se-Jin, Y. Heat transfers thermodynamic activity of a secondgrade ternary nanofluid flow over a vertical plate with Atangana-Baleanu time-fractional integral. Alex. Eng. J. 2022, 6, 10045–10053. [Google Scholar]
  20. Gong, P. Exponential bipartite consensus of fractional-order nonlinear multi-agent systems in switching directed signed networks. IET Control Theory Appl. 2020, 14, 2582–2591. [Google Scholar] [CrossRef]
  21. Li, R.; Wu, H.; Cao, J. Impulsive exponential synchronization of fractional-order complex dynamical networks with derivative couplings via feedback control based on discrete time state observations. Acta Math. Sci. 2022, 42B, 737–754. [Google Scholar] [CrossRef]
  22. Wang, X.; Wu, H.; Cao, J. Global leader-following consensus in finite time for fractional-order multi-agent systems with discontinuous inherent dynamics subject to nonlinear growth. Nonlinear Anal.-Hybrid Syst. 2020, 37, 100888. [Google Scholar] [CrossRef]
  23. Liu, J.; Li, P.; Qi, L.; Chen, W. Distributed formation control of double-integrator fractional-order multi- agent systems with relative damping and nonuniform time-delays. J. Frankl. Inst.-Eng. Appl. Math. 2019, 356, 5122–5150. [Google Scholar] [CrossRef]
  24. Liu, Y.; Dong, X.; Shi, P.; Ren, Z.; Liu, J. Distributed fault-tolerant formation tracking control for multiagent systems with multiple leaders and constrained actuators. IEEE Trans. Cybern. 2022, 1–10. [Google Scholar] [CrossRef]
  25. Gong, Y.; Wen, G.; Peng, Z.; Huang, T. Observer-based time-varying formation control of fractional-order multi-agent systems with general linear dynamics. IEEE Trans. Circuits Syst. II-Express Briefs 2020, 67, 82–86. [Google Scholar] [CrossRef]
  26. Vahid, M.; Mahdi, S.; Davood, A.; Ehsan, S. Leader following distributed formation tracking in nonlinear fractional-order multi-agent systems by using adaptive integral sliding mode approach. In Proceedings of the 2019 27th Iranian Conference on Electrical Engineering (ICEE), Yazd, Iran, 30 April–2 May 2019. [Google Scholar]
  27. Chen, B.; Hu, J.; Zhao, Y.; Bijoy Kumar, G. Leader-following consensus of linear fractional-order multi-agent systems via event-triggered control strategy. IFAC-PapersOnLine 2020, 53, 2909–2914. [Google Scholar] [CrossRef]
  28. Zhang, Y.; Wu, H.; Cao, J. Global Mittag–Leffler consensus for fractional singularly perturbed multi-agent systems with discontinuous inherent dynamics via event-triggered control strategy. J. Frankl. Inst.-Eng. Appl. Math. 2021, 358, 2086–2114. [Google Scholar] [CrossRef]
  29. Liu, P.; Xiao, F.; Wei, B. Event-Triggered control for multi-agent systems: Event mechanisms for information transmission and controller update. J. Syst. Sci. Complex. 2021, 35, 953–972. [Google Scholar] [CrossRef]
  30. Zhao, J.; Zhao, G. Periodic dynamic event-triggered cluster formation control of multi-agent systems. In Proceedings of the International Conference on Intelligent Automation and Soft Computing, Chicago, IL, USA, 26–28 May 2021; Springer: Berlin/Heidelberg, Germany, 2021. [Google Scholar]
  31. Wang, J.; Gao, J.; Wu, P. Attack-resilient event-triggered formation control of multi-agent systems under periodic DoS attacks using complex Laplacian. ISA Trans. 2021, in press. [Google Scholar] [CrossRef]
  32. Li, Y.; Yang, G. Observer-based fuzzy adaptive event-triggered control codesign for a class of uncertain nonlinear systems. IEEE Trans. Fuzzy Syst. 2018, 26, 1589–1593. [Google Scholar] [CrossRef]
  33. Liu, G.; Pan, Y.; Lam, H.; Liang, H. Event-triggered fuzzy adaptive quantized control for nonlinear multi-agent systems in nonaffine pure-feedback form. Fuzzy Sets Syst. 2021, 416, 27–46. [Google Scholar] [CrossRef]
  34. Deng, J.; Li, K.; Wu, S.; Wen, Y. Distributed adaptive time-varying formation tracking control for general linear multi-agent systems based on event-triggered strategy. IEEE Access 2020, 8, 13204–13217. [Google Scholar] [CrossRef]
  35. Li, Y.; Hu, X.; Che, W.; Hou, Z. Event-based adaptive fuzzy asymptotic tracking control of uncertain nonlinear systems. IEEE Trans. Fuzzy Syst. 2021, 29, 3003–3013. [Google Scholar] [CrossRef]
  36. Liu, J.; Fang, J.-A.; Li, Z.; Miao, Q. Event-Triggering formation tracking for second-order multi-agent systems subjected to input saturation. IEEE Access 2019, 7, 138378–138390. [Google Scholar] [CrossRef]
  37. Wang, M.; Zhang, T. Leader-following formation control of second-order nonlinear systems with time-varying communication delay. Int. J. Control Autom. Syst. 2021, 19, 1729–1739. [Google Scholar] [CrossRef]
  38. Cai, Y.; Zhang, H.; Gao, Z.; Yang, L.; He, Q. Adaptive bipartite event-triggered time-varying output formation tracking of heterogeneous linear multi-agent systems under signed directed graph. IEEE Trans. Neural Netw. Learn. Syst. 2022, 1–10. [Google Scholar] [CrossRef]
  39. Zhang, Y.; Wu, H.; Cao, J. Group consensus in finite time for fractional multiagent systems with discontinuous inherent dynamics subject to Hölder growth. IEEE Trans. Cybern. 2020, 52, 4161–4172. [Google Scholar] [CrossRef]
  40. Marco, C.; Pietro, D.; Hogan, S.; Bernardo, M. Synchronization of networks of piecewise-smooth systems. IEEE Control Syst. Lett. 2018, 2, 653–658. [Google Scholar]
  41. Zhu, W.; Jiang, Z. Event-based leader-following consensus of multi-agent systems with input time delay. IEEE Trans. Autom. Control 2015, 60, 1362–1367. [Google Scholar] [CrossRef]
Figure 1. Schematic of ETCSl.
Figure 1. Schematic of ETCSl.
Fractalfract 06 00380 g001
Figure 2. Interaction topology between agents.
Figure 2. Interaction topology between agents.
Fractalfract 06 00380 g002
Figure 3. The triggered instants of all followers in Example 1.
Figure 3. The triggered instants of all followers in Example 1.
Fractalfract 06 00380 g003
Figure 4. The trajectories of control input in Example 1.
Figure 4. The trajectories of control input in Example 1.
Fractalfract 06 00380 g004
Figure 5. Formation tracking errors in Example 1. (a) formation tracking errors of ξ i 1 ; (b) formation tracking errors of ξ i 2 .
Figure 5. Formation tracking errors in Example 1. (a) formation tracking errors of ξ i 1 ; (b) formation tracking errors of ξ i 2 .
Fractalfract 06 00380 g005
Figure 6. States trajectory snapshots of agents at different times.
Figure 6. States trajectory snapshots of agents at different times.
Fractalfract 06 00380 g006
Figure 7. Interaction topology between agents.
Figure 7. Interaction topology between agents.
Fractalfract 06 00380 g007
Figure 8. The triggered instants of all followers in Example 2.
Figure 8. The triggered instants of all followers in Example 2.
Fractalfract 06 00380 g008
Figure 9. The trajectories of control input in Example 1.
Figure 9. The trajectories of control input in Example 1.
Fractalfract 06 00380 g009
Figure 10. Formation tracking errors in Example 2. (a) formation tracking errors of ξ i 1 ; (b) formation tracking errors of ξ i 2 ; (c) formation tracking errors of ξ i 2 .
Figure 10. Formation tracking errors in Example 2. (a) formation tracking errors of ξ i 1 ; (b) formation tracking errors of ξ i 2 ; (c) formation tracking errors of ξ i 2 .
Fractalfract 06 00380 g010
Figure 11. Formation tracking errors in Example 2. (a) formation tracking errors of ξ i 1 ; (b) formation tracking errors of ξ i 2 .
Figure 11. Formation tracking errors in Example 2. (a) formation tracking errors of ξ i 1 ; (b) formation tracking errors of ξ i 2 .
Fractalfract 06 00380 g011
Figure 12. States trajectory snapshots of agents at different times.
Figure 12. States trajectory snapshots of agents at different times.
Fractalfract 06 00380 g012
Table 1. Notations.
Table 1. Notations.
SymbolStand for
R , N + Set of real numbers and positive integers
R m m-dimensional Euclidean space
R m × n m × n real matrices
I m m-dimensional identify matrix
0 m m-dimensional zero matrix
diag { } a block-diagonal matrix
A > 0   ( A < 0 ) Positive (negative) definite matrix
x i = 1 n x i 2 is the vector norm of x
Kronecker product
A T ( A 1 ) Transpose(inverse) of matrix A
λ max ( A ) ( λ min ( A ) )Maximal (Minimal) eigenvalue of A
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Wang, Y.; Zhang, J.; Wu, H. Distributed Adaptive Mittag–Leffler Formation Control for Second-Order Fractional Multi-Agent Systems via Event-Triggered Control Strategy. Fractal Fract. 2022, 6, 380. https://doi.org/10.3390/fractalfract6070380

AMA Style

Wang Y, Zhang J, Wu H. Distributed Adaptive Mittag–Leffler Formation Control for Second-Order Fractional Multi-Agent Systems via Event-Triggered Control Strategy. Fractal and Fractional. 2022; 6(7):380. https://doi.org/10.3390/fractalfract6070380

Chicago/Turabian Style

Wang, Yougang, Jing Zhang, and Huaiqin Wu. 2022. "Distributed Adaptive Mittag–Leffler Formation Control for Second-Order Fractional Multi-Agent Systems via Event-Triggered Control Strategy" Fractal and Fractional 6, no. 7: 380. https://doi.org/10.3390/fractalfract6070380

Article Metrics

Back to TopTop