Next Article in Journal
An Adaptive ANP & ELECTRE IS-Based MCDM Model Using Quantitative Variables
Next Article in Special Issue
Bistatic Radar Observations Correlation of LEO Satellites Considering J2 Perturbation
Previous Article in Journal
Safety Margin Prediction Algorithms Based on Linear Regression Analysis Estimates
Previous Article in Special Issue
A Distributed Formation Joint Network Navigation and Positioning Algorithm
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Containment Control for Discrete-Time Multi-Agent Systems with Nonconvex Control Input and Position Constraints

School of Electronic and Information Engineering, Xi’an Jiaotong University, Xi’an 710049, China
*
Author to whom correspondence should be addressed.
Mathematics 2022, 10(12), 2010; https://doi.org/10.3390/math10122010
Submission received: 14 May 2022 / Revised: 6 June 2022 / Accepted: 9 June 2022 / Published: 10 June 2022
(This article belongs to the Special Issue Mathematical Problems in Aerospace)

Abstract

:
With increasing attention on containment control problems in several areas, we investigate this specific problem which can be more practical. Systems with nonconvex input and position constraints are common but can be strongly nonlinear. A distribute algorithm using a projection operator is proposed to ensure that the control input of every follower remains in a nonconvex set and that all followers stay in the closed set given by leaders. In analysis, a model transformation is proposed, and then we introduce a method utilizing two similar triangles to prove the acceptability of the algorithm. The findings of the research could be pragmatic in robotics, astronautics, and so on. At last, numerical simulations are provided to show the contrast and results.

1. Introduction

Over the past few years, containment control has attracted widespread attention due to its potential applications in robotics, astronautics, biology, traffic engineering, etc. The potential of containment control for different areas such as game theory and cyberattack is significant. Numerous works on containment control have been conducted, as in [1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26]. Containment control problem is associated with systems composed of follower agents and multiple leaders. The purpose of containment control is to drive all followers into the convex hull spanned by some static leaders. In [7], the containment control problem was studied when the communication graph was fixed, while containment control with switching topologies where the communication graphs were strongly connected was discussed in [9]. In [16], communication delays for containment control were taken into consideration.
Most of the above works focused on problems in which states and control input of agents had no constraints. In practical situations, agents are always subject to constraints due to physical limitations. For instance, the velocities of vehicles and satellites are constrained to lie in a certain zone. In [27], the consensus problem with convex constraints were studied; the nonconvex constraints of velocity and control input were discussed in [28]. In [29], switching topologies were taken into consideration, which are different from a consensus problem, since the final positions of followers do not converge to one point but a convex hull. The above methods cannot be directly applied to the containment problem with constraints. In [30], the projection operator was used to solve the containment problem with nonconvex control input constraints; the containment problem with position constraints was studied in [31].
In this work, the main task is to take into consideration the control input and position constraints for a containment control problem with switching topologies. A distributed algorithm is proposed to ensure that every follower in the multiagent system can converge into the convex hull spanned by the given leaders. Meanwhile, the position of every follower stays in a closed set given before and the control input does not need to keep lying in a hypercube. In the following, by using model transformation and analyzing the distance from each follower to the convex hull formed by given points, it is shown that the containment control problem can be solved when the directed spanning tree exists in the union of the graphs. In Section 2, the graph theory and multiagent dynamic model id introduced. In Section 3, we describe the main algorithm of the containment control system and the analysis of the main result when applied to a system with nonconvex control input and position constraints. In Section 4, we provide some simulation examples to confirm the feasibility of the algorithm. Finally, concluding notes and further works are remarked in Section 5.

2. Model and Statement

2.1. Preliminaries and Notations

Let G ( V , E , A ) represent a directed graph, where V = { 1 , 2 , , n + m } is the set of nodes, E V × V is the set of edges, and A = [ a i j ] is the weighted adjacency matrix. Each a i j is nonnegative and a i i = 0 holds for every agent i . Suppose that ( j , i ) E is an edge of the directed graph, and a directed path is a sequence of edges of the form ( i 1 , i 2 ) , ( i 2 , i 3 ) , , otherwise, a i j ( k ) > 0 if the agent i can get information from agent j at time k and a i j ( k ) = 0 .
Notations: The set of r-dimensional real column vectors is represented by r ; , , and + represent the set of positive real numbers, nonnegative integers, and positive integers, respectively; x and x T denote the Euclidean norm and transpose of the vector x , respectively; the projection of vector x onto a closed convex set X is represented by P Y ( x ) , where P Y ( x ) = arg min x ˜ X ∥>∥ x x ˜ .

2.2. Description of Model

Consider a multiagent system with n + m agents, i.e., n followers and m leaders. The set of all followers and leaders can be denoted, respectively, by N f = { 1 , 2 , .. , n } and N l = { n + 1 , n + 2 , .. , n + m } . Let y n + 1 , y n + 2 , y n + m r be the m static points of the leaders, which forms the convex hull denoted by Y = { i = n + 1 n + m α i y i | α i 0 , i = n + 1 n + m α i = 1 } .
Each follower is constrained to lie in a convex constraint set that is denoted by X i . The dynamics of follower is:
x i ( ( k + 1 ) T ) = P X i [ x i ( k T ) + v i ( k T ) T ] v i ( ( k + 1 ) T ) = v i ( k T ) + u i ( k T ) T
where x i ( k T ) r , v i ( k T ) r , and u i ( k T ) r denote the position, the velocity, and the control input of the follower i , respectively. In many practical systems, the control input and position state of the agents are always constrained. Next, we give Assumption 1:
Assumption 1.
Let 0 U i r for i = 1 , 2 , .. , n be the bounded nonempty closed sets, max x U i S U i ( x ) = λ ¯ i and min x U i S U i ( x ) = λ _ i , where λ ¯ i and λ _ i are both positive constants. Then, S U i ( · ) is a constrained operator defined by S U i ( x ) = x x max 0 δ x { δ | δ γ x x U i , 0 γ 1 } where x 0 and S U i ( 0 ) = 0 , as shown in Figure 1.
Remark 1.
Assumption 1 aims to find a new vector S U i ( x ) which has the same direction as vector x and satisfies γ S U i ( x ) U i for all 0 γ 1 and S U i ( x ) x for the bounded nonempty closed set U i . This assumption shows that every follower can move in all directions. Moreover, the control input of agents are constrained. We suppose each follower to be available in every direction in this paper.
In this paper, our objective is to propose a proper algorithm to drive each follower, whose position and control input are constrained, to move into the convex hull Y formed by the leaders, that is, lim k x i ( k ) P Y ( x i ( k ) ) = 0 for i N f .

3. Main Results

3.1. Containment Control Algorithm

In this section, we would give a nonlinear algorithm to solve the containment control problem with nonconvex control input and position constraints and switching topologies.
u i = S U i [ p i v i ( k ) c i ( k ) ( x i ( k ) P Y i ( k ) ( x i ( k ) ) ) + j N i ( k ) a i j ( k ) ( x j ( k ) x i ( k ) ) ]
for i N f , where p i > 0 represents the velocity damping gain of follower i , c i ( k ) = c > 0 when follower i can receive information directly from one or more leaders at time k , and c i ( k ) = 0 otherwise, and N i ( k ) is the set of neighbors of agent i . a i j ( k ) is the edge weight of edge ( j , i ) , and it is assumed that if a i j ( k ) > 0 , then a i j ( k ) is lower bounded by a positive constant. Y i ( k ) Y is the convex hull formed by leaders whose information can be received by follower i directly at time k .

3.2. Analysis of Algorithm

In this section, we provide some necessary assumptions and lemmas to analyze the algorithm given in Section 3.1.
Assumption 2.
Give an infinite sequence of time k 0 , k 1 , k 2 , k 3 , satisfying k 0 > 0 and 0 < k q + 1 k q C where q N and C N + . For every follower, it can be found at least one directed path from given static points to this follower in the union of the graphs in each time interval [ k q , k q + 1 ) .
Remark 2.
This assumption ensures that each follower can receive information from the given static leaders directly or indirectly in every time interval.
It is clear that System (1) with (2) has strong nonlinearities due to the existence of the nonconvex control input and position constraints. For this reason, we first introduce a model transformation as follows:
Define
θ i ( k ) = c i ( k ) [ x i ( k ) P Y i ( k ) ( x i ( k ) ) ] + j N i ( k ) a i j ( k ) ( x j ( k ) x i ( k ) )
and
h i ( k ) = 1 , i f   p i v i ( k ) + θ i ( k ) = 0 S U i [ p i v i ( k ) + θ i ( k ) ] p i v i ( k ) + θ i ( k ) , e l s e
Then, System (2) can be rewritten as:
u i ( k ) = h i ( k ) ( p i v i ( k ) + θ i ( k ) )
Define
v ˜ i ( k ) = x i ( k ) + 2 p i v i ( k )
and
e i ( k ) = P X i [ x i ( k ) + p i 2 ( v ˜ i ( k ) x i ( k ) T ) ] [ x i ( k ) + p i 2 ( v ˜ i ( k ) x i ( k ) T ) ]
for i N f .
Systems (1) and (2) can be transformed into:
x i ( k + 1 ) = P X i [ x i ( k ) + p i 2 ( v ˜ i ( k ) x i ( k ) T ) ] v ˜ i ( k + 1 ) = P X i [ x i ( k ) + p i 2 ( v ˜ i ( k ) x i ( k ) T ) ] + ( 1 p i h i ( k ) T ) ( v ˜ i ( k ) x i ( k ) ) + 2 h i ( k ) T p i j N i ( k ) a i j ( k ) ( x j ( k ) x i ( k ) ) 2 h i ( k ) c i T p i ( x i ( k ) P Y i ( k ) ( x i ( k ) ) )
for i N f .
Put the definition of (4) into equation, System (5) could be rewritten as:
x i ( k + 1 ) = ( 1 p i T 2 ) x i ( k ) + p i 2 v ˜ i ( k ) T + e i ( k ) v ˜ i ( k + 1 ) = [ p i ( h i ( k ) 1 2 ) T 2 h i ( k ) T p i ( j N i a i j ( k ) + c i ) ] x i ( k ) + ( 1 p i ( h i ( k ) 1 2 ) T ) v ˜ i ( k ) + 2 h i ( k ) T p i j N i a i j ( k ) x j ( k ) + 2 h i ( k ) c i T p i P Y i ( k ) ( x i ( k ) ) + e i ( k )
for i N f .
From System (6), it can be easily found that the sum of the coefficients of x i ( k ) and v ˜ i ( k ) in the first equation and the coefficients of x i ( k ) , v ˜ i ( k ) , x j ( k ) , and P Y i ( k ) ( x i ( k ) ) in the other equation are both equal to 1, which means the existence of e i ( k ) destroys the linearity of x i ( k + 1 ) with x i ( k ) and v ˜ i ( k ) , v ˜ i ( k + 1 ) with x i ( k ) , v ˜ i ( k ) , x j ( k ) , and P Y i ( k ) ( x i ( k ) ) . Hence, the next step is to remove e i ( k ) when k . Give the following definition:
g i ( k ) = j N i ( k ) a i j ( k ) + c i ( k ) τ i a ( k ) = [ p i T ( h i 1 2 ) 2 h i T p i g i ( k ) ] / ( 1 2 h i T p i g i ( k ) ) τ i b ( k ) = [ 1 p i T ( h i 1 2 ) ] / ( 1 2 h i T p i g i ( k ) ) τ i c ( k ) = 1 2 h i T p i g i ( k )
and
q i a ( k ) = τ i a ( k ) x i ( k ) + τ i b ( k ) v ˜ i ( k ) + 1 τ i c ( k ) e i ( k )
for i N f . Then, (6) could be transformed as:
v ˜ i ( k + 1 ) = τ i c ( k ) q i a ( k ) + 2 h i ( k ) T p i j N i a i j ( k ) x j ( k ) + 2 h i ( k ) c i T p i P Y ( x i ( k ) )
for i N f .
Assumption 3.
j N i ( k ) a i j ( k ) ( x j ( k ) x i ( k ) ) Q i / 2 and c i ( k ) [ x i ( k ) P Y i ( k ) ( x i ( k ) ) ] Q i / 2 for some constant Q i > 0 .
Remark 3.
This assumption could be satisfied easily. By using the operator S U i ( x ) defined in Assumption 1, the terms j N i ( k ) a i j ( k ) ( x j ( k ) x i ( k ) ) and c i ( k ) [ x i ( k ) P Y i ( k ) ( x i ( k ) ) ] can be redefined as S V i [ j N i ( k ) a i j ( k ) ( x j ( k ) x i ( k ) ) ] and S V i [ c i ( k ) [ x i ( k ) P Y i ( k ) ( x i ( k ) ) ] ] , where V i = { y | y 1 2 Q i } . As the definition of h i ( k ) , we define that h ¯ i ( k ) = S V i [ j N i ( k ) a i j ( k ) ( x j ( k ) x i ( k ) ) ] j N i ( k ) a i j ( k ) ( x j ( k ) x i ( k ) ) and h ˜ i ( k ) = S V i [ c i ( k ) [ x i ( k ) P Y i ( k ) ( x i ( k ) ) ] ] c i ( k ) [ x i ( k ) P Y i ( k ) ( x i ( k ) ) ] . It is clear that the two terms can be expressed as j N i ( k ) h ¯ i ( k ) a i j ( k ) ( x j ( k ) x i ( k ) ) and c i ( k ) h ˜ i ( k ) [ x i ( k ) P Y i ( k ) ( x i ( k ) ) ] , where 0 < h ¯ i ( k ) , h ˜ i ( k ) 1 . Then, it can be similarly proven that h ¯ i ( k ) and h ˜ i ( k ) are lower bounded by a positive constant with the discussion in Lemma 1.
Lemma 1.
Under Assumption 4 and the definition of operator S U i ( · ) , we have that if 0 Q i λ _ i / 2 , there exists k m > 0 such that:
σ i h i ( k ) 1
for i N f and k k m , where σ i = ( λ _ i Q i ) / ( 2 Q i ) .
Proof of Lemma 1.
From the definition of h i ( k ) , it is apparently that 0 < h i ( k ) < 1 and p i v i ( k ) + θ i ( k ) > λ _ i when p i v i ( k ) + θ i ( k ) S U i [ p i v i ( k ) + θ i ( k ) ] , and h i ( k ) = 1 otherwise. Define Φ i ( k ) = 1 2 v i ( k ) 2 . From the definition of difference, there is:
Δ Φ i ( k ) = Φ i ( k + 1 ) Φ i ( k ) = ( v i T ( k + 1 ) 2 v i T ( k ) 2 ) / 2 2 p i h i ( k ) Φ i ( k ) + Q i 2 Φ i ( k ) = 2 Φ i ( k ) ( p i h i ( k ) 2 Φ i ( k ) Q i )
Considering the property of h i ( k ) , it can be easily deduced that λ _ i / ( p i v i ( k ) + Q i ) h i ( k ) < 1 . Given all this and the condition of Lemma 1, we have:
v i ( k ) 2 Φ i ( k ) ( p i λ _ i p i v i ( k ) + Q i 2 Φ i ( k ) Q i ) 2 Φ i ( k ) ( p i λ _ i p i + Q i / v i ( k ) Q i )
When p i λ _ i / ( p i + Q i / v i ( k ) ) Q i > ε 0 , which is v i ( k ) > Q i ( ε 0 + Q i ) / [ p i ( λ _ i Q i ε 0 ) ] , ε 0 > 0 is a sufficiently small constant, v i ( k ) Q i ( ε 0 + Q i ) ε 0 / [ p i ( λ _ i Q i ε 0 ) ] can be obtained under the condition of this lemma. Therefore, there exists a constant k m > 0 such that v i ( k ) > Q i ( ε 0 + Q i ) / [ p i ( λ _ i Q i ε 0 ) ] for all k k m . From the assumption of Lemma 1 that 0 Q i λ _ i / 2 , we have Q i 2 / [ p i ( λ _ i Q i ) ] > ( λ _ i Q i ) / p i . Then, we get ( λ _ i Q i ε 0 ) / Q i h i ( k ) 1 for all k k m . Since that ε 0 can be arbitrarily small, ( λ _ i Q i ) / 2 Q i h i ( k ) 1 holds, for all k k m . □
Assumption 4.
Suppose that 0 < p i T < 1 , p i 2 4 d i m > α 1 , d i m > j N i a i j ( k ) + c i ( k ) for α i > 0 , d i m > 0 , for all i F and k .
Remark 4.
This assumption gives the design rules of the algorithm parameters. The parameter p i can be selected by the following steps:
(1) 
Select the value of p i such that 0 < p i T < 1 and p i 2 4 d i m > α 1 for two constants α i > 0 and d i m > 0 .
(2) 
Select the values of each nonzero a i j ( k ) and c such that j N i a i j ( k ) + c i ( k ) < d i m for each k .
Lemma 2
[32].Let X r denote a nonempty closed convex set. x i r and scalars a i 0 satisfying i = 1 n a i = 1 . It follows i = 1 n a i x i P X ( i = 1 n a i x i ) i = 1 n a i x i P X ( x i ) .
Lemma 3
[33].Considering a closed convex set 0 Z R r , for any x , y R r and all z Z , inequalities [ x P Z ( x ) ] T ( x z ) 0 , P Z ( x ) z 2 x z 2 P Z ( x ) x 2 and P Z ( x ) P Z ( y ) x y hold.
In order to eliminate e i ( k ) , we present the following lemmas.
Lemma 4.
Under Assumption 4, the following statements stand for all i N f and all k :
(1) 
τ i a ( k ) + τ i b ( k ) = 1 and τ i c ( k ) + 2 h i ( k ) T p i j N i a i j ( k ) + 2 h i ( k ) c i T p i = 1 ;
(2) 
α 2 < τ i a ( k ) < 1 2 , 1 2 < τ i b ( k ) < 1 α 2 , 1 2 < τ i c ( k ) < 1 .
Proof of Lemma 4.
(1)
As the definition in (7), τ i c ( k ) = 1 2 h i T p i g i ( k ) and g i ( k ) = j N i ( k ) a i j ( k ) + c i ( k ) , for all i F and all k . It follows that
τ i c ( k ) + 2 h i ( k ) T p i j N i a i j ( k ) + 2 h i ( k ) c i T p i = 1 2 h i ( k ) T p i ( j N i ( k ) a i j ( k ) + c i ( k ) ) + 2 h i ( k ) T p i j N i a i j ( k ) + 2 h i ( k ) c i ( k ) T p i = 1
Note that τ i a ( k ) = [ p i T ( h i 1 2 ) 2 h i T p i g i ( k ) ] / ( 1 2 h i T p i g i ( k ) ) and τ i b ( k ) = [ 1 p i T ( h i 1 2 ) ] / ( 1 2 h i T p i g i ( k ) ) , it is obviously that τ i a ( k ) + τ i b ( k ) = 1 .
(2)
Under Assumption 4, 0 < p i T < 1 and p i 2 4 d i m > 0 . It can be deduced that 1 2 > 1 2 p i T > 2 d i m T / p i > 2 g i T / p i 2 c i T / p i 0 . According to the definition of τ i b , we have 1 / 2 < τ i b < 1 α 2 for some constant 0 < α 2 < 1 / 2 . In the proof of Lemma 4(1), τ i a ( k ) + τ i b ( k ) = 1 . Thus, α 2 < τ i a ( k ) < 1 / 2 ; also under 0 2 g i T / p i < 1 / 2 and Lemma 1, it shows that 1 2 < τ i c ( k ) = 1 2 h i T p i g i ( k ) < 1 . □
Lemma 5.
Under Assumptions 4 and 5, the following two inequalities hold for all i N f and all k :
Proof of Lemma 5.
(1)
Let q i b ( k ) = ( 1 p i T 2 ) x i ( k ) + p i 2 v ˜ i ( k ) T for i N f . Since P Y ( q i b ( k ) ) X i , we have
  x i ( k + 1 ) P Y ( x i ( k + 1 ) ) = P X i ( q i b ( k ) ) P Y ( P X i ( q i b ( k ) ) ) P X i ( q i b ( k ) ) P Y ( q i b ( k ) )
for i N f .
From Lemma 3, we have
  x i ( k + 1 ) P Y ( x i ( k + 1 ) ) 2 P X i ( q i b ( k ) ) P Y ( q i b ( k ) ) 2 q i b ( k ) P Y ( q i b ( k ) ) 2 P X i ( q i b ( k ) ) q i b ( k ) 2 = q i b ( k ) P Y ( q i b ( k ) ) 2 e i ( k ) 2
for i N f .
Then, we use Lemma 2. It can transform to:
  x i ( k + 1 ) P Y ( x i ( k + 1 ) ) q i b ( k ) P Y ( q i b ( k ) ) = ( 1 p i T 2 ) x i ( k ) + p i 2 v ˜ i ( k ) T P Y ( ( 1 p i T 2 ) x i ( k ) + p i 2 v ˜ i ( k ) T ) ( 1 p i T 2 ) x i ( k ) P Y ( x i ( k ) ) + p i T 2 v ˜ i ( k ) P Y ( v ˜ i ( k ) )
for i N f .
(2)
Notice that 2 c i h i ( k ) T / p i 0 , 2 a i j ( k ) h i ( k ) T / p i 0 , τ i c ( k ) > 1 / 2 and τ i c ( k ) + ( 2 h i ( k ) T / p i ) j N i a i j ( k ) + 2 h i ( k ) c i T / p i = 1 . It follows that
  v ˜ i ( k + 1 ) P Y ( v ˜ i ( k + 1 ) ) τ i c ( k ) q i a ( k ) P Y ( q i a ( k ) ) + 2 h i ( k ) T p i × j N i a i j ( k ) x j ( k ) P Y ( x j ( k ) ) + 2 h i ( k ) c i T p i × P Y i ( k ) ( x i ( k ) ) P Y ( P Y i ( k ) ( x i ( k ) ) )
for i N f .
Because Y i ( k ) Y , it follows that
v ˜ i ( k + 1 ) P Y ( v ˜ i ( k + 1 ) ) τ i c ( k ) q i a ( k ) P Y ( q i a ( k ) ) + 2 h i ( k ) T p i × j N i a i j ( k ) x j ( k ) P Y ( x j ( k ) )
for i N f . □
Lemma 6.
Under Assumption 4, the following inequality:
q i a ( k ) P Y ( q i a ( k ) ) τ i a ( k ) x i ( k ) P Y ( x i ( k ) ) + τ i b ( k ) v ˜ i ( k ) P Y ( v ˜ i ( k ) )
holds for all i N f and all k .
Proof of Lemma 6.
Let q i c ( k ) = τ i a ( k ) x i ( k ) + τ i b ( k ) v ˜ i ( k ) for i N f . It can be easily observed that q i a ( k ) P Y ( q i a ( k ) ) q i a ( k ) P Y ( q i c ( k ) ) for i N f .
  • When e i ( k ) = 0 , q i a ( k ) P Y ( q i c ( k ) ) = q i c ( k ) P Y ( q i c ( k ) ) for i N f . Now, it should be proven that when e i ( k ) 0 , q i a ( k ) P Y ( q i c ( k ) ) q i c ( k ) P Y ( q i c ( k ) ) for i N f .
  • Define q i d ( k ) = P X i ( q i b ( k ) ) for convenience, and it is clear that e i ( k ) = q i d ( k ) q i b ( k ) .
Now, define two hyperplanes Ψ 1 and Ψ 2 , shown in Figure 2, that e i ( k ) is perpendicular to them, q i d ( k ) Ψ 1 and q i a ( k ) Ψ 2 . Meanwhile, it is clear that e i ( k ) / τ i c ( k ) = q i a ( k ) q i c ( k ) is perpendicular to the hyperplanes. Then, define β i a ( k ) and β i b ( k ) , as shown in Figure 2.
β i a ( k ) = ( 1 δ i 1 ) x i ( k ) + δ i 1 v ˜ i ( k ) Ψ 1 β i b ( k ) = ( 1 δ i 2 ) x i ( k ) + δ i 2 v ˜ i ( k ) Ψ 2
for the constants 0 < δ i 1 < 1 and 0 < δ i 2 < 1 .
It follows that there exist two similar triangles constituted by points β i a ( k ) , q i d ( k ) , q i b ( k ) and points β i b ( k ) , q i a ( k ) , q i c ( k ) . Now, the characters of similar triangles can be applied.
As shown in Figure 2, define a i 1 = p i T / 2 δ i 1 > 0 . It follows that q i b ( k ) β i a = a i 1 ( v ˜ i ( k ) x i ( k ) ) . Since the similarity of triangles, it can be obtained that q i c ( k ) β i b = a i 1 ( v ˜ i ( k ) x i ( k ) ) / τ i c ( k ) , i.e., β i b = q i c ( k ) a i 1 ( v ˜ i ( k ) x i ( k ) ) / τ i c ( k ) . δ i 2 = ( 1 p i T + δ i 1 ) / τ i c > δ i 1 can be obtained in the same way. Moreover, Ψ 2 and X are at the different sides of Ψ 1 . Given all this, it follows that the angle between vectors q i a ( k ) q i c ( k ) and q i a ( k ) P Y ( q i c ( k ) ) is an obtuse angle, which means q i a ( k ) P Y ( q i c ( k ) ) q i c ( k ) P Y ( q i c ( k ) ) . Notice Lemma 2 and 4(1), it can be seen that q i c ( k ) P Y ( q i c ( k ) ) τ i a ( k ) x i ( k ) P Y ( x i ( k ) ) + τ i b ( k ) v ˜ i ( k ) P Y ( v ˜ i ( k ) ) . Above all, it follows that
q i a ( k ) P Y ( q i a ( k ) ) q i a ( k ) P Y ( q i c ( k ) ) q i c ( k ) P Y ( q i c ( k ) ) τ i a ( k ) x i ( k ) P Y ( x i ( k ) ) + τ i b ( k ) v ˜ i ( k ) P Y ( v ˜ i ( k ) )
for i N f . □

3.3. Analysis of Result

In this section, the result of containment control using the given algorithm would be analyzed. First, we design a Lyapunov function.
Let ξ ( k ) = [ x 1 T ( k ) , v ˜ 1 T ( k ) , x n T ( k ) , v ˜ n T ( k ) ] . Design a Lyapunov function as:
V ( k ) = max i 1 , 2 , 2 n { ξ i ( k ) P Y ( ξ i ( k ) ) }
Summarizing the above lemma and analysis, it follows that
x i ( k + 1 ) P Y ( x i ( k + 1 ) ) max i F { x i ( k ) P Y ( x i ( k ) ) , v ˜ i ( k ) P Y ( v ˜ i ( k ) ) }
and
v ˜ i ( k + 1 ) P Y ( v ˜ i ( k + 1 ) ) max i F { x i ( k ) P Y ( x i ( k ) ) , v ˜ i ( k ) P Y ( v ˜ i ( k ) ) }
for all i N f .
Next, we analyze the convergence of containment control problem under the given algorithm in the time interval [ k l , k l + 1 ) .
Case A. Assuming that there is an agent i q that can get information from one of the static leaders at k l 0 [ k l , k l + 1 ) . Clearly, c i q > 0 and τ i q c ( k ) + 2 h i q ( k ) T / p i q j N i q a i q j ( k ) = 1 2 h i q ( k ) c i q T / p i q < 1 . Note that
v ˜ i ( k + 1 ) P Y ( v ˜ i ( k + 1 ) ) τ i c ( k ) q i a ( k ) P Y ( q i a ( k ) ) + 2 h i ( k ) T p i j N i a i j ( k ) x j ( k ) P Y ( x j ( k ) )
and
v ˜ i q ( k l 0 + 1 ) P Y ( v ˜ i q ( k l 0 + 1 ) ) ( 1 2 h i q ( k l 0 ) c i q T p i q ) V ( k l 0 ) ( 1 2 h i q ( k l 0 ) c i q T p i q ) V ( k l ) m 1 V ( k l )
where 0 < m 1 < 1 .
Moreover, there is
x i q ( k l 0 + 1 ) P Y ( x i q ( k l 0 + 1 ) ) ( 1 1 2 p i q T ) V ( k l 0 ) + 1 2 p i q T × ( 1 2 h i q ( k l 0 ) c i q T p i q ) V ( k l 0 ) ( 1 h i q ( k l 0 ) c i q T 2 ) V ( k l ) m 2 V ( k l )
where 0 < m 2 < 1 .
Case B. Suppose that there exists an agent i q that satisfies v ˜ i q ( k l 0 ) P Y ( v ˜ i q ( k l 0 ) ) ( 1 m 3 ) V ( k l ) at time k l 0 [ k l , k l + 1 ) . It can be deduced from Lemmas 4 and 5 that
x i q ( k l 0 + 1 ) P Y ( x i q ( k l 0 + 1 ) ) ( 1 1 2 p i q T ) V ( k l ) + 1 2 p i q T ( 1 m 3 ) V ( k l ) ( 1 m 3 h i q ( k l 0 ) c i q T ) V ( k l ) m 4 V ( k l )
where 0 < m 4 < 1 .
Moreover, it follows that
v ˜ i q ( k l 0 + 1 ) P Y ( v ˜ i q ( k l 0 + 1 ) ) τ i q c ( k l 0 ) τ i q a ( k l 0 ) V ( k l ) + m 3 τ i q c ( k l 0 ) τ i q b ( k l 0 ) V ( k l ) + 2 h i q ( k l 0 ) T p i q j N i q , j i q a i q j ( k l 0 ) V ( k l ) [ 1 ( 1 1 2 p i q h i q ( k l 0 ) T ) ( 1 m 3 ) ] V ( k l ) m 4 ( k l 0 + 1 ) V ( k l )
Then, after recursive calculations, we can obtain x i q ( k l + 1 ) P Y ( x i q ( k l + 1 ) ) m 4 V ( k l ) and v ˜ i q ( k l + 1 ) P Y ( v ˜ i q ( k l + 1 ) ) m 4 V ( k l ) where 0 < m 4 < 1 .
Case C. Suppose that there exist 2 agents i q and i s that satisfy x i q ( k l 0 ) P Y ( x i q ( k l 0 ) ) m 5 V ( k l ) for some constant 0 m 5 < 1 and a i s i q > γ for some constant γ > 0 at time k l 0 [ k l , k l + 1 ) , which means agent i s can receive information from agent i q at k l 0 . It follows that
v ˜ i s ( k l 0 + 1 ) P Y ( v ˜ i s ( k l 0 + 1 ) ) τ i s c ( k l 0 ) V ( k l ) + 2 h i s ( k l 0 ) T p i s × j N i s , j i s a i s j ( k l 0 ) V ( k l ) + 2 h i s ( k l 0 ) T m 5 p i s a i s i q ( k l 0 ) V ( k l ) [ 1 ( 1 m 5 ) 2 h i s ( k l 0 ) T p i s γ ] V ( k l ) m 6 V ( k l )
where 0 < m 6 < 1 .
From p i s T < 1 , it can be obtained that
0 < 1 ( 1 m 5 ) 2 h i s ( k l 0 ) T p i s γ < 1 ( 1 m 5 ) γ 2 h i s ( k l 0 ) T 2 < 1
Hence, by using Lemma 5, it follows that
x i s ( k l 0 + 1 ) P Y ( x i s ( k l 0 + 1 ) ) ( 1 1 2 p i s T ) V ( k l ) + 1 2 p i s T × [ 1 ( 1 m 5 ) 2 h i s ( k l 0 ) T p i s γ ] V ( k l ) [ 1 ( 1 m 5 ) γ 2 h i s ( k l 0 ) T 2 ] V ( k l ) = m 6 V ( k l )
where 0 < m 6 < 1 .
Theorem 1.
Based on Assumptions 1–4, applying constrained control input algorithm (2) to System (1), all followers are driven into the convex hull spanned by leaders, i.e., lim k + x i ( k ) P Y ( x i ( k ) ) = 0 for i N f .
Proof of Theorem 1.
As shown in Assumption 2, it can always find one or more follower that can receive information from one of the static leaders directly in every time interval [ k l , k l + 1 ) , which guarantees the condition of Case A. That is, v ˜ i q ( k l 0 + 1 ) P Y ( v ˜ i q ( k l 0 + 1 ) ) m 1 V ( k l ) and x i q ( k l 0 + 1 ) P Y ( x i q ( k l 0 + 1 ) ) m 2 V ( k l ) hold, where 0 < m 1 < 1 and 0 < m 2 < 1 ; then, consider Case B, it follows that x i q ( k ) P Y ( x i q ( k ) ) m 4 V ( k l ) and v ˜ i q ( k ) P Y ( v ˜ i q ( k ) ) m 4 V ( k l ) works for 0 < m 4 < 1 and all k [ k l + 1 , k l + n + 1 ) . It is clear that agent i s i q which could get information from agent i q or one of the static leaders at k [ k l + 1 , k l + 2 ) exists. Hence, by using the calculation of Cases A, B, and C, it could be obtained that v ˜ i s ( k ) P Y ( v ˜ i s ( k ) ) m ˜ 6 V ( k l ) and x i s ( k ) P Y ( x i s ( k ) ) m ˜ 6 V ( k l ) for 0 < m ˜ 6 < 1 and all k [ k l + 2 , k l + n ) . Recall that the constants m 1 , m 2 , m 4 , and m ˜ 6 are only affected by constants c i , T , p i , h i , γ , and topologies in the time interval. Therefore, it can certainly find a constant 0 < η < 1 satisfying η > m i , where i = 1 , 2 , 4 , 6 . Given all this, V ( k m + n ) < η n V ( k m ) holds. To summarize all the calculations, we have lim k + x i ( k ) P Y ( x i ( k ) ) = lim k + V ( k ) = 0 for i N f . □

4. A Numerical Example

4.1. Simulation Parament Configuration

Give a multiagent system composed of 6 followers and 4 leaders. The graphs of switching topologies are shown in Figure 3. The switching step of the system is 0.5 s and the sequence of the graphs is { G a , G b } , { G b , G c } , { G c , G d } , { G d , G a } . The weights of all edges a i j = 0.7 . The parameters are c i = 0.3 and p i = 12 for i N f and the sampling time is T = 0.1   s . The control input constraint set is U i = { x | x [ 0 , 3 / 2 ] T 0.5 } { x | x 1 } { x | x [ 0 , 3 / 2 ] T 0.5 } . The position constraint sets of the followers are X 1 = { x | x [ 0 , 1 ] T 6 } and X 2 = { x | x [ 2 , 1 ] T 6 } . For followers, the initial states of position are [ 1.5 , 2 ; 2 , 0.5 ; 0 , 1 ; 3 , 3 ; 4 , 1 ; 3.5 , 0 ] T and the initial states of velocity states are [ 1 , 1 ; 1 , 0 ; 1 , 1 ; 1 , 1 ; 1 , 0 ; 1 , 1 ] T . For leaders, the initial states of position is [ 0 , 2 ; 2 , 2 ; 2 , 0 ; 0 , 0 ] T .

4.2. Simulation Result

The convex hull is spanned by static points, as illustrated in Figure 4. Figure 5 shows the control input of followers. The containment errors of followers are shown in Figure 6.
The switching graphs are illustrated in Figure 3 which satisfy the assumption that each follower could get information from at least one leader directly or indirectly in every time interval. In Figure 4, Followers 1, 2, and 3 stay in the left circle which illustrates the constraint of position, while Followers 4, 5, and 6 stay in the right circle. The convex region spread by the 4 leaders is the target region. Figure 5 gives the constraints of control input that is a nonconvex hull. It shows the containment errors of followers by using the distance form every follower to the target region in Figure 6.

4.3. Simulation Comparison

In this section, we provide some simulation comparison results.
As compared with Figure 5, Figure 7 shows the control input without constraints. It is clear that our algorithm could be more practical in reality. In Figure 8, we can see that the algorithm can still achieve containment control when a sudden interference happens, which means the algorithm has stability to some extent.

5. Conclusions

In the above work, containment control for a multiagent system with nonconvex control input and position constraints was discussed. To solve the problem, a nonlinear algorithm with projection operator for followers was proposed. After the analysis of the distance from every follower to the convex hull spanned by static leaders, it is found that all followers could be driven into the convex hull formed by leaders and the position states of followers remain in the constraint set. Finally, a numerical example is given to guarantee the theoretical results.
Under analysis of the algorithm and simulation results, our work has the following advantages:
(1)
The projection operator we introduced can ensure the control input of every follower to lie in a nonconvex set which is useful in practice. It has apparent superiority as compared with other algorithms which can be seen in the simulation.
(2)
With the existence of constraints both in control input and position, the system has strong nonlinearity. By model transformation and introducing new error variable, we successfully remove the nonlinearity and achieve containment control.
(3)
In the process of analysis, we introduce a geometrical method which uses two similar triangles. This method solves the problem in the proof of effectiveness of our algorithm.
Of course, there are still many shortcomings in our current work. In future study, we will take the dynamic situation of leaders into consideration. Meanwhile, we hope to make better analysis and results against interference, and therefore, the algorithm may get closer to practical application.

Author Contributions

Conceptualization, N.G. and Y.Y.; methodology, N.G.; software, N.G.; formal analysis, N.G. and Y.Y.; resources, Y.Y.; data curation, N.G.; writing—original draft preparation, N.G.; writing—review and editing, N.G.; visualization, N.G.; supervision, Y.Y.; project administration, Y.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Key Research and Development Program of China (2017YFC1500904) and the National Key Research and Development Program of China (2016YFB0501301).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Ji, M.; Ferrari-Trecate, G.; Egerstedt, M.; Buffa, A. Containment Control in Mobile Networks. IEEE Trans. Autom. Control. 2008, 53, 1972–1975. [Google Scholar] [CrossRef]
  2. Jiang, Y.; Schmidt, J. Motion of dust ejected from the surface of asteroid (101955) Bennu. Heliyon 2020, 6, e05275. [Google Scholar] [CrossRef] [PubMed]
  3. Liu, Y.; Jiang, Y.; Li, H. Bifurcations of relative equilibrium points during homotopy deformation of asteroids. Celest. Mech. Dyn. Astron. 2021, 133, 42. [Google Scholar] [CrossRef]
  4. Qiang, L.; Yu, J.; Zhang, Y.; Gao, Y.; Guo, X.; Cui, R.; Wang, S.; Guo, W.; Lv, T.; Cai, L.; et al. Optimal attitude control for solar array orientation. Open Astron. 2021, 30, 73–82. [Google Scholar]
  5. Zhan, C.; Jiang, Y.; Li, H.; Liu, Y. Dynamics and control of typical orbits around Saturn. Appl. Sci. 2022, 12, 1462. [Google Scholar] [CrossRef]
  6. Liu, Y.; Jiang, Y.; Li, H. Bifurcations of periodic orbits in the gravitational field of irregular bodies: Applications to Bennu and Steins. Aerospace 2022, 9, 151. [Google Scholar] [CrossRef]
  7. Li, J.; Ren, W.; Xu, S. Distributed Containment Control with Multiple Dynamic Leaders for Double-Integrator Dynamics Using Only Position Measurements. IEEE Trans. Autom. Control. 2012, 57, 1553–1559. [Google Scholar] [CrossRef]
  8. Liu, H.; Xie, G.; Wang, L. Necessary and sufficient conditions for containment control of networked multi-agent systems. Automatica 2012, 48, 1415–1422. [Google Scholar] [CrossRef]
  9. Notarstefano, G.; Egerstedt, M.; Haque, M. Containment in leaderfollower networks with switching communication topologies. Automatica 2011, 47, 1035–1040. [Google Scholar] [CrossRef]
  10. Su, H.; Jia, G.; Chen, M.Z. Semi-global containment control of multi-agent systems with intermittent input saturation. J. Frankl. Inst. 2015, 352, 3504–3525. [Google Scholar] [CrossRef]
  11. Xu, C.; Zheng, Y.; Su, H.; Zhang, C.; Chen, M.Z. Necessary and sufficient conditions for distributed containment control of multi-agent systems without velocity measurement. IET Control. Theory Appl. 2014, 8, 1752–1759. [Google Scholar] [CrossRef]
  12. Wang, X.; Li, S.; Shi, P. Distributed Finite-Time Containment Control for Double-Integrator Multiagent Systems. IEEE Trans. Cybern. 2014, 44, 1518–1528. [Google Scholar] [CrossRef] [PubMed]
  13. Zhang, J.; Li, W.; Xie, L. Containment control of leader-following multi-agent systems with Markovian switching network topologies and measurement noises. Automatica 2015, 51, 263–267. [Google Scholar]
  14. Kan, Z.; Shea, J.M.; Dixon, W.E. Leaderfollower containment control over directed random graphs. Automatica 2016, 6, 56–62. [Google Scholar] [CrossRef]
  15. Su, H.; Chen, M.Z.Q.; Wang, X.; Lam, J. Semiglobal Observer-Based Leader-Following Consensus with Input Saturation. IEEE Trans. Ind. Electron. 2014, 61, 2842–2850. [Google Scholar] [CrossRef]
  16. Liu, K.; Xie, G.; Wang, L. Containment control for second-order multi-agent systems with time-varying delays. Syst. Control. Lett. 2014, 67, 24–31. [Google Scholar] [CrossRef]
  17. Song, Q.; Liu, F.; Su, H.; Vasilakos, A.V. Semiglobal and global containment control of multiagent systems with secondorder dynamics and input saturation. Int. J. Robust Nonlinear Control. 2016, 26, 3439–3670. [Google Scholar] [CrossRef]
  18. Ren, W.; Meng, Z.; You, Z. Distributed finite-time attitude containment control for multiple rigid bodies. Automatica 2010, 46, 2092–2099. [Google Scholar]
  19. Su, H.; Chen, M.Z.Q. Multi-agent containment control with input saturation on switching topologies. IET Control. Theory Appl. 2015, 9, 399–409. [Google Scholar] [CrossRef]
  20. Lin, P.; Xu, J.; Ren, W.; Yang, C.; Gui, W. Angle-Based Analysis Approach for Distributed Constrained Optimization. IEEE Trans. Autom. Control. 2021, 66, 5569–5576. [Google Scholar] [CrossRef]
  21. Lin, P.; Ren, W.; Farrell, J. Distributed Continuous-Time Optimization: Nonuniform Gradient Gains, Finite-Time Convergence, and Convex Constraint Set. IEEE Trans. Autom. Control. 2017, 62, 2239–2253. [Google Scholar] [CrossRef]
  22. Lian, F.; Chakrabortty, A.; Duel-Hallen, A. Game-Theoretic Multi-Agent Control and Network Cost Allocation Under Communication Constraints. IEEE J. Sel. Areas Commun. 2017, 35, 330–340. [Google Scholar] [CrossRef]
  23. Delaram, J.; Houshamand, M.; Ashtiani, F.; Valilai, O.F. A utility-based matching mechanism for stable and optimal resource allocation in cloud manufacturing platforms using deferred acceptance algorithm. J. Manuf. Syst. 2021, 60, 569–584. [Google Scholar] [CrossRef]
  24. Bakolas, E.; Lee, Y. Decentralized game-theoretic control for dynamic task allocation problems for multi-agent systems. In Proceedings of the 2021 American Control Conference (ACC), New Orleans, LA, USA, 25–28 May 2021; pp. 3228–3233. [Google Scholar]
  25. Fan, W.; Wang, S.; Gu, X.; Zhou, Z.; Zhao, Y.; Huo, W. Evolutionary game analysis on industrial pollution control of local government in China. J. Environ. Manag. 2021, 298, 113499. [Google Scholar] [CrossRef] [PubMed]
  26. Sathishkumar, M.; Liu, Y.-C. Resilient Memory Event-triggered Consensus Control for Multi-Agent Systems with Aperiodic DoS Attacks. Int. J. Control. Autom. Syst. 2022, 20, 1800–1813. [Google Scholar] [CrossRef]
  27. Lin, P.; Ren, W.; Yang, C.; Gui, W. Distributed Continuous-Time and Discrete-Time Optimization with Nonuniform Unbounded Convex Constraint Sets and Nonuniform Stepsizes. IEEE Trans. Autom. Control. 2019, 64, 5148–5155. [Google Scholar] [CrossRef]
  28. Lin, P.; Ren, W.; Yang, C.; Gui, W. Distributed Consensus of Second-Order Multiagent Systems with Nonconvex Velocity and Control Input Constraints. IEEE Trans. Autom. Control. 2018, 63, 1171–1176. [Google Scholar] [CrossRef]
  29. Lin, P.; Ren, W.; Gao, H. Distributed Velocity-Constrained Consensus of Discrete-Time Multi-Agent Systems with Nonconvex Constraints, Switching Topologies, and Delays. IEEE Trans. Autom. Control. 2017, 62, 5788–5794. [Google Scholar] [CrossRef]
  30. Yang, C.; Duan, M.; Lin, P.; Ren, W.; Gui, W. Distributed Containment Control of Continuous-Time Multiagent Systems with Nonconvex Control Input Constraints. IEEE Trans. Ind. Electron. 2019, 66, 7927–7934. [Google Scholar] [CrossRef]
  31. Lin, P.; Li, G.; Huang, K. Position-constrained containment for second-order discrete-time multi-agent systems. Syst. Control. Lett. 2020, 142, 104–109. [Google Scholar] [CrossRef]
  32. Lin, P.; Ren, W.; Yang, C.; Gui, W. Distributed Optimization with Nonconvex Velocity Constraints, Nonuniform Position Constraints, and Nonuniform Stepsizes. IEEE Trans. Autom. Control. 2019, 64, 2575–2582. [Google Scholar] [CrossRef]
  33. Facchinei, F.; Pang, J.S. Finite-Dimensional Variational Inequalities and Complementarity Problems; Springer: New York, NY, USA, 2003. [Google Scholar]
Figure 1. Example of S U i ( x ) .
Figure 1. Example of S U i ( x ) .
Mathematics 10 02010 g001
Figure 2. Example of similar triangles.
Figure 2. Example of similar triangles.
Mathematics 10 02010 g002
Figure 3. Switching graphs.
Figure 3. Switching graphs.
Mathematics 10 02010 g003
Figure 4. Position states x i ( k ) of all agents.
Figure 4. Position states x i ( k ) of all agents.
Mathematics 10 02010 g004
Figure 5. Control input u i ( k ) of followers.
Figure 5. Control input u i ( k ) of followers.
Mathematics 10 02010 g005
Figure 6. Containment errors of followers.
Figure 6. Containment errors of followers.
Mathematics 10 02010 g006
Figure 7. Control input without constraints.
Figure 7. Control input without constraints.
Mathematics 10 02010 g007
Figure 8. Position states and containment errors with interference.
Figure 8. Position states and containment errors with interference.
Mathematics 10 02010 g008
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Gao, N.; Yang, Y. Containment Control for Discrete-Time Multi-Agent Systems with Nonconvex Control Input and Position Constraints. Mathematics 2022, 10, 2010. https://doi.org/10.3390/math10122010

AMA Style

Gao N, Yang Y. Containment Control for Discrete-Time Multi-Agent Systems with Nonconvex Control Input and Position Constraints. Mathematics. 2022; 10(12):2010. https://doi.org/10.3390/math10122010

Chicago/Turabian Style

Gao, Ning, and Yikang Yang. 2022. "Containment Control for Discrete-Time Multi-Agent Systems with Nonconvex Control Input and Position Constraints" Mathematics 10, no. 12: 2010. https://doi.org/10.3390/math10122010

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop