Next Article in Journal
Self-Supervised Representation Learning for Quasi-Simultaneous Arrival Signal Identification Based on Reconnaissance Drones
Next Article in Special Issue
Multiple Unmanned Aerial Vehicle Autonomous Path Planning Algorithm Based on Whale-Inspired Deep Q-Network
Previous Article in Journal
Diffusion Nonlinear Estimation and Distributed UAV Path Optimization for Target Tracking with Intermittent Measurements and Unknown Cross-Correlations
Previous Article in Special Issue
Synchronized Tracking Control of Dynamic System of Unmanned Rear-Wheel Vehicles Based on Dynamic Analysis
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Multi-Group Tracking Control for MASs of UAV with a Novel Event-Triggered Scheme

1
School of Information Science and Engineering, Chengdu University, Chengdu 610106, China
2
Institute of Electronic and Information Engineering of UESTC in Guangdong, Dongguan 523808, China
3
State Key Laboratory of Oil and Gas Reservoir Geology and Exploitation, Southwest Petroleum University, Chengdu 610500, China
4
School of Economics and Management, Beihang University, Beijing 100191, China
*
Authors to whom correspondence should be addressed.
Drones 2023, 7(7), 474; https://doi.org/10.3390/drones7070474
Submission received: 8 June 2023 / Revised: 16 July 2023 / Accepted: 17 July 2023 / Published: 18 July 2023
(This article belongs to the Special Issue UAV Trajectory Generation, Optimization and Cooperative Control)

Abstract

:
The flight control of UAVs can be implemented and theoretically analyzed using multi-agent systems (MASs), and tracking control is one of the important control technologies. This paper studies multi-group tracking control for multi-agent systems of UAV, in which the control scheme combines event-triggered technology and impulsive theory. The advantage of multi-group tracking control lies in its ability to realize multiple groups of tracking targets and make the UAV complete multiple groups of tasks. The tracking control makes use of a novel dynamic event-triggered control (DETC) proposed in this paper, in which it can better regulate and optimize the triggering frequency by adjusting the parameters. Furthermore, several forms of network interference that may affect the safety of UAV tracking control have also been resolved. Lastly, simulations are presented with numerical examples to showcase the efficacy of the proposed tracking control.

1. Introduction

The tracking problem is one of the most hot issues in cooperative control of UAV, and has gained much attention in recent years due to its wide applications in various fields such as drone control, search and rescue missions, environmental monitoring, precision agriculture, infrastructure inspection, entertainment and so on [1,2,3,4]. One important representation of the mathematical model of UAV is the multi-agent systems. Automation and dynamics form the fundamental principles of multi-agent systems, which are further bolstered by the theories of intelligent networks and complex networks [5,6,7,8,9,10,11,12]. Based on automation and dynamics, the objective of tracking control is to develop effective protocols that enable a collective of agents to achieve a desired target based on any initial configuration. There are several common methods for tracking control of multi-agent systems: potential fields [9], behavioral approaches [10], decentralized control [11], graph theory [13], and leader-follower approach [14]. The majority of prior works have concentrated on decentralized tracking of a single target, where all agents converge to an identical target. Nevertheless, in numerous real-world applications, like multi-objective cooperative searching and hunting, agents may separate into multiple subgroups to execute distinct distributed tasks. Thus, the multi-group tracking control problem represents a crucial and essential area of research.
In recent years, several fascinating achievements regarding multi-group tracking control have emerged in the literature. For instance, there have been several investigations on data acquisition [15], event-triggered scheme (ETS) [4] and leader-following systems [16] based on multi-group. However, the current body of research on multi-group tracking control solely focuses on continuous-time processes, which necessitates a constant energy supply for the multi-agent systems. This inspires us to explore multi-group tracking control in non-continuous time. Impulsive control has garnered significant interest owing to its capacity to achieve the desired performance through intermittent control inputs [17]. By providing state information and control signals at discrete impulsive instants, the impulsive control technique offers several advantages to multi-agent systems, such as consensus problem [18], secure control [19], and tracking control [2], among others. Hence, we consider using impulsive instants as the discontinuous control instants for multi-group tracking. However, the determination of how to achieve control objectives efficiently by selecting these impulsive instants is a subject to be contemplated in our next step. It is envisaged that these instants can be determined by an event-triggered mechanism. Event-triggered control is an efficient and resource-saving control method for multi-agent systems [20,21,22]. A common characteristic of the existing literature is that the flexible triggering scheme is seldom considered under complex network interference and control protocols. In practical scenarios, the triggering condition must be effectively synchronized with the current state and time instant, rather than being exclusively reliant on mathematical conditions. Furthermore, controllers ought to work seamlessly under conditions of the redundant interference signal, the communication interference of information and node connectivity interference signal. Therefore, network interference issues occurring during system operation are under our consideration. In [23], the consensus criteria of multi-agent systems under cyber attack are addressed, and corresponding distributed event-triggered schemes featuring sampled-data are constructed. Similarly, in [24], a novel control technique for attack-resilience based on event-triggered schemes of multi-agent systems under denial-of-service (DoS) attacks is proposed. The combination of event-triggered schemes and impulsive theory represents a novel and advantageous control approach for addressing multi-group tracking control problems in multi-agent systems. Due to the frequent occurrence of network interference in tracking control, it is imperative to explore this issue. This paper investigates three forms of the network interference problem and solves multi-group secure tracking under network interference.
This study focuses on impulsive event-triggered control for multi-group secure tracking (MGST) in nonlinear second-order multi-agent systems based on UAV that are subjected to network interference. The first section in this study introduces the research background, related research status, and the work of this paper. The second section describes the relevant concepts, modeling, theoretical derivation, and control methods of multi-agent systems for UAVs. The third section provides verification examples to demonstrate the effectiveness of the proposed methods. The fourth section discusses the proposed methods in detail. Finally, the fifth section summarizes the methods and contents of the study. Our primary contributions can be summarized as follows.
1.
Multi-group tracking control is employed for multi-agent systems of UAV rather than the single target tracking control, and the control scheme is based on event-triggered and impulsive theory, which is more practical to accommodate complex cooperative control compared to the existing research [18,25] on single target tracking control and pure impulsive control scheme.
2.
A new event-triggered scheme is designed that contains multiple tunable parameters compared to the studies [26,27,28], which can better regulate and optimize the triggering frequency by adjusting the parameters. The fine triggering helps achieve precise tracking control performance, and the Zeno phenomenon is proven to be excluded.
3.
Several types of network interference of UAVs introduced below Equation (5) and in Remark 8 have been taken into consideration, which can effectively cope with certain forms of network interference and disruptions. Sufficient conditions for the new secure tracking control are obtained.

2. Materials and Methods

In this section, we introduce the main contents of the article, which mainly include five parts: Preliminaries and Notation Description, System Modeling and Analysis, Novel Dynamic Event-Triggered Control Scheme, Definitions and Assumptions, and Sufficient Conditions and Proof of Achieving System Performance. The first part introduces the symbols used in the article and some defined knowledge points. The second part describes the system model and relevant deductions and analyses. The third part introduces the novel dynamic event-triggered control scheme and analyzes its advantages. The fourth part provides the definitions and assumptions used in the article. Finally, the fifth part derives the sufficient conditions for achieving system performance and provides its proof.

2.1. Preliminaries and Notation Description

Notations: We use the following notations throughout this paper. R n , S n and R n × n represent the n-dimensional Euclidean space, the set of real symmetric matrices, and the set of all n × n real matrices, respectively. The matrix inequality X < Y ( X Y ) implies that the matrix X Y is negative definite (respectively, semi-negative definite). The operator d i a g { } represents a block diagonal matrix, while S y m { A } denotes the matrix A + A T . The symbol 0 indicates a zero matrix with appropriate dimension or a value of zero. Moreover, we define E to be the mathematical expectation of random variables.
In this study, we consider a directed graph G = { V , E , A } , where the node set V ( G ) contains N agents and E is the edge set. A directed edge e i j ( i , j ) in E indicates that agent j is capable of receiving information from agent i. A = ( a i j ) N , N is the adjacency matrix, which is defined as a weighted matrix with non-negative elements corresponding to the edges of the graph. Specifically, an element a i j > 0 if and only if there exists a directed edge ( i , j ) E . We assume that the diagonal elements a i i are all zero. For i j , let l i j = a i j ; for i = 1 , 2 , , N , let l i i = j = 1 , j i N a i j , then L = ( l i j ) N , N is a Laplacian matrix.
In order to investigate the problem of MGST, we introduce an additional graph G ˇ that represents the interconnected topology of a multi-agent system comprising M leaders and N followers in UAV. In this study, V F is defined as the set of N follower nodes, which can be labeled 1 , 2 , , N , and V L is defined as the set of leader nodes, which can be labeled 1 , 2 , , M . We assume the diagonal matrix B = diag b 1 , b 2 , , b N represents the adjacency matrix for leaders. and b i is the connection weight between follower node i and the leader. If follower i is not connected to any leader, then b i = 0 ; otherwise, b i > 0 .
Assume that the agents are divided into M subgroups in UAV, denoted by G l = V l , E l , where l { 1 , 2 , , M } . It is assumed that V l 1 V l 2 = for all l 1 l 2 , and i = 1 M V i = V . The number of agents in the l-th subgroup is denoted by n l , where l = 1 M n l = N . Let ρ l = p = 1 l n p 1 , then V l = 1 + ρ l , 2 + ρ l , , n l + ρ l represents set of node-numbering in the l-th subgroup, where n 0 = 0 . Additionally, the diagonal weighted matrix concerned about G l is denoted as B l , and the total leader adjacency weighted matrix can be represented as B = diag B 1 , B 2 , , B M .
To facilitate understanding of the following text, we provide a block diagram as shown in Figure 1. Note that l { 1 , 2 , , M } and Equation (1) introduces i V F . In our proposed model, multi-group tracking control is established so that N nodes are divided into M groups for tracking control. We have described the grouping method in detail above Figure 2 and Equation (9), and the subsequent text under the next subsection: System Modeling and Analysis describes the processing and derivation of multi-group tracking control. As can be seen from Figure 1, the control scheme we propose is based on event-triggered and impulsive theory. This new event-triggered scheme is designed with multiple tunable parameters, which can better regulate and optimize the triggering frequency by adjusting them. We describe the advantages of multiple tunable parameters in Remarks 1–3. In the control process, several types of network interference of UAV are considered, which can effectively cope with certain forms of network interference and disruptions. In addition, Theorems 1 and 2 derive sufficient conditions for achieving system performance.

2.2. System Modeling and Analysis

Consider the following second-order nonlinear multi-agent systems based on UAV:
x ˙ i ( t ) = v i ( t ) , v ˙ i ( t ) = u i ( t ) + f i t , v i ( t ) , i V F ,
where x i ( t ) R q , v i ( t ) R q , and u i ( t ) R q represent the position, velocity, and control input variables of the i-th agent corresponding to the followers of multi-agent systems in UAV, respectively. Each agent or node stands for a drone in UAV. f i t , v i ( t ) denotes a nonlinear function that satisfies Assumption 1 for i = 1 , 2 , , N .
Suppose that the second-order nonlinear dynamical equation of the leaders of multi-agent systems in UAV can be expressed as follows:
x ˙ j ( t ) = v j ( t ) , v ˙ j ( t ) = g j t , v j ( t ) , j V L ,
where x j ( t ) R q , v j ( t ) R q , represent the position and velocity variables of the j-th agent corresponding to the leaders of multi-agent systems in UAV, respectively. g j t , v j ( t ) denotes a nonlinear function that satisfies Assumption 1 for j = 1 , 2 , , M .
Let { t k } be a time sequence such that 0 = t 0 < t 1 < < t k < and lim k t k = . An impulsive controller can be defined as follows:
u i ( t ) = k = 1 γ p i ( t k ) δ ( t t k ) , i = 1 , 2 , , N ,
where the symbol γ represents a constant, the variable p i ( t ) and δ ( t ) denote the continuous function and the Dirac function. t k is referred to as the impulsive instant.
p i ( t ) = μ i ( t ) p ˜ i ( t ) ,
with
p ˜ i ( t ) = j N i a i j ( x j ( t ) x i ( t ) x j * x i * + k v v j t v i t ) + θ i ( t ) m i ( t ) + b i [ ( x l t x i ( t ) + x i * k v v i t v l t ] ,
where i belongs to the set V l , where l { 1 , 2 , , M } , μ i ( t ) R denotes the redundant interference signal. And k v represents the velocity damping gain. a i j stands for the weight of the communication link from agent i to agent j, while b i refers to the element in matrix B representing the linked weight from the i-th agent. And we use m i ( t ) to represent the redundant interference signal, which is a common manifestation of network attacks and signal interference in practical engineering settings. To simulate the occurrence of such signals, the random variable θ i ( t ) is introduced, following a 0 1 distribution with mathematical expectation θ , where θ is a constant. The vector m ( t ) = [ m 1 T ( t ) , m 2 T ( t ) , , m N T ( t ) ] T describes the degree of the redundant signal, with the assumption that m T ( t ) m ( t ) m ^ . Furthermore, the control signal may also be affected by the communication interference of information, which can be modeled using the independent random variable μ i ( t ) U ( μ ̲ , μ ¯ ) . This variable represents the degree of interference and has a uniform distribution. We also assume independence between the two terms, θ i ( t ) and μ i ( t ) . In this paper, the redundant interference signal, the communication interference of information and node connectivity interference signal that are described in Remark 8 are collectively referred to as network interference in UAV.
Defining
x ^ i ( t ) = x i ( t ) x i * x l ( t ) , v ^ i ( t ) = v i ( t ) v l ( t ) , i V l , l = 1 , 2 , , M ,
by combining Equations (1)–(5), the ensuing dynamics can be obtained:
x ^ ˙ i ( t ) = v ^ i ( t ) , v ^ ˙ i ( t ) = f i t , v i ( t ) g l t , v l ( t ) , t ( t k , t k + 1 ] , Δ v ^ i t k = γ μ i ( t k ) j N i ( a i j x ^ j t k x ^ i t k + k v v ^ j t k v ^ i t k + θ i ( t ) m i ( t ) b i x ^ i t k + k v v ^ i t k ) ,
where v ^ i ( t k ) v ^ i ( t k + ) v ^ i ( t k ) , v ^ i ( t k ) = v ^ i ( t k ) = lim h 0 v ^ ( t k + h ) .
For further analysis of the subgroup, let
x ˇ l = x ^ ρ l + 1 T , x ^ ρ l + 2 T , , x ^ ρ l + n l T T R q n l , p ˇ l ( t ) = p ρ l + 1 T ( t ) , p ρ l + 2 T ( t ) , , p ρ l + n l T ( t ) T R q n l , μ ˇ l ( t ) = d i a g { μ ρ l + 1 ( t ) , μ ρ l + 2 ( t ) , , μ ρ l + n l ( t ) } R n l × n l , θ ˇ l ( t ) = θ ρ l + 1 ( t ) , θ ρ l + 2 ( t ) , , θ ρ l + n l ( t ) T R n l , m ˇ l ( t ) = m ρ l + 1 T ( t ) , m ρ l + 2 T ( t ) , , m ρ l + n l T ( t ) T R q n l , v ˇ l = v ^ ρ l + 1 T , v ^ ρ l + 2 T , , v ^ ρ l + n l T T R q n l , f l ( t ) = f ρ l + 1 t , v ρ l + 1 ( t ) T , , f ρ l + n l t , v ρ l + n l ( t ) T T , F l ( t ) = f l ( t ) g l t , v l ( t ) 1 n l , 1 n l = = [ 1 , 1 , , 1 ] T R n l .
For the dynamical Equation (6), simplification can be achieved by using the Kronecker product and categories of groups as follows:
x ˇ ˙ l ( t ) = v ˇ l ( t ) , v ˇ ˙ l ( t ) = F l ( t ) , t ( t k , t k + 1 ] , Δ v ˇ l t k = ( γ μ ˇ l ( t ) L l + B l ) I q x ˇ l t k ( γ k v μ ˇ l ( t ) L l + B l ) I q v ˇ l t k + γ ( μ ˇ l ( t k ) θ ˇ l ( t k ) 1 q m ˇ l ( t k ) ) , t = t k ,
where v ˇ i ( t k ) v ˇ i ( t k + ) v ˇ i ( t k ) , v ˇ i ( t k ) = v ˇ i ( t k ) = lim h 0 v ˇ ( t k + h ) . ⊙ denotes the Hadamard product. The symbol ⊗ typically represents the tensor product operation between matrices. I q denotes the q × q identity matrix. 1 q = [ 1 , 1 , , 1 ] T R q , B l = diag b ρ l + 1 , b ρ l + 2 , , b ρ l + n l , L l denotes the Laplacian matrix corresponding to the l-th group. Let ε l ( t ) = x ˇ l T ( t ) , v ˇ l T ( t ) T R 2 q n l , F ˇ l ( t ) = 0 q n l , F l T ( t ) T R 2 q n l . The dynamics can be transformed into
ε ˙ l ( t ) = A l ε l ( t ) + F ˇ l ( t ) , t ( t k , t k + 1 ] , Δ ε l t k = C l ε l t k + ϑ l ( t ) , t = t k , l = 1 , 2 , , M ,
where A l = 0 n l I n l 0 n l 0 n l I q , C l = 0 q n l 0 q n l ( γ μ ˇ l ( t ) L l + B l ) I q ( γ k v μ ˇ l ( t ) L l + B l ) I q and F ^ l ( t ) = 0 q n l F l ( t ) , ϑ l ( t ) = γ ( μ ˇ l ( t ) θ ˇ l ( t ) 1 q m ˇ l ( t ) ) .
Taking Figure 2 as reference, we consider a multi-agent system consisting of 14 followers separated into three subgroups in UAV. The asterisks are the leaders of the agents. Specifically, N = 14 , M = 3 , and the followers are partitioned into V 1 = { 1 , 2 , , 5 } , V 2 = { 6 , 7 , 8 , 9 } , and V 3 = { 10 , 11 , , 14 } , which implies that the drones in UAV are divided into three subgroups V 1 , V 2 , and V 3 . The inter-subgraph connections are positively weighted, and there exist positive or negative couplings among multiple subgroups, satisfying Assumption 3. Consequently, we can reorganize and simplify the error system (8) for each subgroup, achieving a compact description of the entire multi-agent system.
Let ε ( t ) = x ˇ T ( t ) , v ˇ T ( t ) T R 2 d N , F ˇ ( t ) = 0 d N , F T ( t ) T R 2 d N . We can extend Equation (8) into the following form by taking all values of l:
ε ˙ ( t ) = A ε ( t ) + F ˇ ( t ) , t ( t k , t k + 1 ] , Δ ε t k = C ε t k + ϑ ( t k ) , t = t k ,
where ε ( t ) = ε 1 T ( t ) , ε 2 T ( t ) , , ε M T ( t ) T R 2 d N , ϑ ( t ) = ϑ 1 T ( t ) , ϑ 2 T ( t ) , , ϑ M T ( t ) T R 2 d N , F ˇ ( t ) = F ˇ 1 T ( t ) , F ˇ 2 T ( t ) , , F ˇ M T ( t ) T R 2 d N , A = 0 N I N 0 N 0 N I d R 2 d N × 2 d N , C = 0 q N 0 q N ( γ μ ˇ ( t ) L + B ) I q ( γ k v μ ˇ ( t ) L + B ) I q .

2.3. Novel Dynamic Event-Triggered Control Scheme

The impulsive control instants in this paper are determined by the dynamic event-triggered scheme (DETS). Define the triggering time sequence { t k } as follows:
t k + 1 = inf { t : t > t k , χ ( t ) 0 } , k = 1 , 2 , , ,
where
χ ( t ) = c 0 e ˜ ( t ) 2 e c 1 ( t t k ) c 2 p ˇ t k 2 e c 3 t k c 4 ( t t 0 ) 2 η ( t ) ,
with c 0 0 , c 1 , c 2 , c 3 , c 4 > 0 , e ˜ ( t ) = p ˇ ( t ) p ˇ ( t k ) , η i ( t 0 ) 0 and
η ˙ ( t ) = c 5 c 0 e ˜ ( t ) 2 e c 1 ( t t k ) c 2 p ˇ t k 2 e c 3 t k c 4 ( t t 0 ) 2 .
The occurrence of Zeno behavior can be proved to be precluded under dynamic event-triggered control (DETC).
Proof. 
From Equations (10) and (11), it follows that for any t [ t k , t k + 1 ) , we can easily infer that
η ˙ ( t ) < c 5 η ( t ) .
Thus,
η ( t ) η ( t 0 ) e c 5 ( t t 0 ) 0 .
Assuming the existence of Zeno behavior, i.e., a < t k < t < t k + 1 < b and lim k t k + 1 t k = 0 , it follows that
c 2 p ˇ t k 2 + e c 3 t k + c 4 ( t k + 1 t 0 ) 2 + η ( t k + 1 ) c 0 e ˜ ( t k + 1 ) 2 e c 1 ( t k + 1 t k ) .
Therefore,
0 < e c 3 b < lim k e c 3 t k + 1 t k + t k c 0 lim k ( p t k + 1 p t k 2 ) e c 1 t k + 1 t k = 0 ,
which challenges the previously held notion of the existence of Zeno behavior. Thus, our proof is now complete. □
Remark 1.
In contrast to previous works [29,30], our proposed triggering scheme incorporates the term c 4 ( t t 0 ) 2 in the initial triggering stage. This feature prevents the trigger from being activated too frequently, which could overload the system. By avoiding excessive triggering at the beginning, our approach effectively prevents redundant triggering (PRT) issues.
Remark 2.
In [29], the triggering scheme does not often include the state of e ˜ t in the previous studies, which limited the information available for triggering. Specifically, it did not take into account the error between the coupling signal of the previous and current triggering instants. In contrast, our proposed triggering scheme addresses this issue. However, if e ˜ ( t ) 2 is excessively small, it may not trigger the condition for prolonged periods of time. This can lead to problems such as data transmission interruption or insufficient triggering conditions in practical engineering applications. To address this issue, we introduce a multiplication factor of e c 1 ( t t k ) after e ˜ ( t ) 2 , which helps to prevent prolonged non-triggering situations while exponentially accelerating triggering (EAT). If e ˜ ( t ) 2 is indeed small enough that no triggering occurs in practice, we can set c 1 to 0 to accommodate such special cases.
Remark 3.
In the traditional ETS, it is possible to implement intelligent triggering by automatically activating the trigger within a fixed time interval if the event has not been triggered. To achieve this, we can utilize Equation (10) to determine the triggering conditions based on c 5 and η ( t ) . The derivative of η ( t ) , denoted as η ˙ ( t ) , can be calculated at any time t * . Let c * be the calculated value of η ˙ ( t * ) , then η ( t ) = c * t can be selected. In this case, the maximum triggering interval is given by 1 c 5 , ensuring that the trigger will be activated within the desired time window. This approach is referred to as linear redress (LR). Furthermore, when c 0 = 0 , the triggering instants are determined at fixed intervals of length 1 c 5 , which is similar to sampled-data technique. This method provides the advantage of sampled-data triggering (SDT).
The conventional event-triggering conditions are typically formulated as the form of | | e ( t ) | | > γ | | x ( t ) | | or e T ( t ) Ω e ( t ) > γ x T ( t ) Ω x ( t ) , which lack adjustability. In Remarks 1–3, we introduced the concept of adjustability in event-triggering conditions. However, in practical applications, these parameters need to be adjusted according to the specific requirements of the engineering system. This implies that event-triggering conditions offer more possibilities for customization but do not possess a fully autonomous adjustment role. Autonomous adjustment will be the focal point of our future research endeavors.
Remark 4.
It can be demonstrated that there is a constant M * such that the given event-triggered strategy satisfies t k + 1 t k < M * .
Proof of Remark 4.
Let ψ ( t ) = c 0 e ˜ ( t ) 2 e c 1 ( t t k ) c 2 p t k 2 e c 3 t k c 4 ( t t 0 ) 2 , f ( t ) = ψ ( t ) c 5 0 t ψ ( s ) d s . Suppose T k t k + 1 t k is not bounded. Since ψ ( t ) is continuous, there exists an instant t * such that ψ ( t ) is negative on ( t k , t * ) .
(1)
If there exists t * * > t * satisfying ψ ( t * * ) = 0 , triggering will occur at t = t * * and the unboundedness assumption of T s is invalid.
(2)
If lim t 0 t ψ ( k ) d s diverges, then 0 t ψ ( k ) d s and f ( t ) + , which triggers the triggering condition and is inconsistent with the unboundedness of t k + 1 t k . If lim t 0 t ψ ( s ) d s converges to a constant c * , then ψ ( t ) 0 and the triggering condition is activated, showing that t k + 1 t k cannot be unbounded.
Therefore, t k + 1 t s < M * holds based on the above analysis. □
Based on Remark 4 and the absence of Zeno behavior, we can set h ¯ = inf t k t k 1 and h ̲ = sup t k t k 1 . From Equation (3), we can observe that the controller only operates at the impulsive instants that are determined by DETC, which is more efficient than continuous communication and better suited to realistic communication scenarios.

2.4. Definitions and Assumptions

Definition 1.
The multi-group secure tracking (MGST) of a second-order nonlinear multi-agent system (9) under a distributed protocol is achieved if there exist a positive constant ρ such that, for any arbitrary initial values, the following conditions hold
E { ε ( t ) } < ρ ,
as t , where ρ is said to be error bound.
Regarding the full content in this paper, we assume the following assumption.
Assumption 1.
For the function f ( · ) , there exist non-negative constants s j ( j = 1 , 2 , , q ) satisfying for any y 1 , y 2 R q ,
f j y 1 , t f j y 2 , t s j y 1 j y 2 j .
Assumption 2.
V l represents the node set belonging to the l-th subgroup, and for any l { 1 , 2 , , M } , a directed spanning tree exists in the graph G l ( V l , E l ) .
Assumption 3.
For the multi-group tracking problem, it is required that each l-th subgraph G l belonging to the subgroups is connected. Additionally, there must be at least one follower connected with the leader l , which implies that B l 0 for all l { 1 , 2 , , M } .
Remark 5.
The purpose of Assumption 2 is to ensure that the communication topology within each group is connected. This means that if any node in a group is controlled, the other nodes are also controllable because there exists a connected path between them. This conclusion can be derived based on graph theory analysis. Assumption 3 aims to ensure that every subgraph can be connected, without isolated subgraphs. Additionally, it ensures that in each group, the leader is connected to at least one follower. This corresponds to Assumption 2, where every node in each group can be communicated with. It implies that every node can be controlled, allowing the controller to avoid ineffective control situations.

2.5. Sufficient Conditions and Proof of Achieving System Performance

In the following part, we investigate MGST for leader-following multi-agent systems described by Equation (9). The main objective is to establish the control conditions for achieving MGST of the leader-following multi-agent systems. To this end, we present the following theorems containing sufficient conditions for achieving MGST of system (9).
Theorem 1.
Assuming that Assumptions 1–3 hold. For systems (9) under the impulsive event-triggered controller (3), we define given scalars c 0 0 , c 1 , c 2 , c 3 , c 4 , c 5 > 0 , 0 < h ̲ < h ¯ , 0 < θ < 1 , 0 < μ ̲ < μ ¯ , m ^ , 0 < λ 1 < λ 2 , any γ > 0 , and κ > 0 . Then, if there exist positive definite matrices P and diagonal positive definite matrices Λ with suitable dimensions, as well as a positive constant ς 2 , such that
1 h ¯ ln ς 1 + ς 2 < 0 ,
P A + A T P + S Λ S ς 2 P P P Λ < 0 ,
λ 1 I P λ 2 I ,
where ς 1 = ( 1 + κ ) λ m a x [ I + S y m { C T I } + C T C ] , S = d i a g { s 1 , s 2 , , s q } I N , μ 1 = μ ̲ + μ ¯ 2 , μ 2 = μ ̲ 2 + μ ̲ μ ¯ + μ ¯ 2 2 . The systems (9) of UAV with network interference can achieve MGST.
Proof of Theorem 1.
Consider the following Lyapunov function as any t belongs to time interval ( t k , t k + 1 ] :
V ( t ) V ( ε ( t ) , t k ) = ε T ( t ) P ε ( t ) , k N + ,
We define the infinitesimal operator L as follows:
L V ( ε ( t ) , t k ) = lim Δ 0 1 Δ E V ( ε ( t + Δ ) , t k ) | V ( ε ( t ) , t k ) V ( ε ( t ) , t k ) .
To deduce the infinitesimal derivative of the function V ( t ) , we have
L V ( t ) S y m [ ε T ( t ) A T + F ˇ T ( ε ( t ) ) ] P ε ( t ) .
By virtue of Assumption 1, it follows that for any diagonal positive definite matrix Λ , we have
ε T ( t ) S T Λ S ε ( t ) F ˇ T ε ( t ) Λ F ˇ ε ( t ) 0 .
From Equation (16), we obtain
L V ( t ) ε T ( t ) P A + A T P ε ( t ) + 2 ε T ( t ) P F ˇ ε ( t ) ς 2 V ( ε ( t ) ) .
Therefore, we can conclude that
E { V ( t ) } E { V ( t k + ) } e ς 2 ( t t k ) , t ( t k , t k + 1 ] .
Taking Q = I + C , we arrive at
E { V ( t k + ) } = E [ Q 1 ε ( t k ) + ϑ ( t ) ] T P [ Q 1 ε ( t k ) + ϑ ( t k ) ] = E { ε T ( t k ) Q 1 T P Q 1 ε ( t k ) + ε T ( t k ) Q 1 T P ϑ ( t k ) + ϑ T ( t k ) P Q 1 e ( t k ) + ϑ T ( t k ) ϑ ( t k ) } E { ε T ( t k ) Q 1 T P Q 1 ε ( t k ) + κ ε T ( t k ) Q 1 T P Q 1 ε ( t k ) + κ 1 ϑ T ( t k ) P ϑ ( t k ) + ϑ T ( t k ) P ϑ ( t k ) } ς 1 E { V ( t k ) } + υ 1 ,
where ς 1 = ( 1 + κ ) λ m a x [ I + S y m { C T I } + C T C ] , υ = γ 2 ( 1 + κ 1 ) μ 2 λ 2 θ m ^ with μ 1 = μ ̲ + μ ¯ 2 and μ 2 = μ ̲ 2 + μ ̲ μ ¯ + μ ¯ 2 2 .
Thus, for any t within the interval ( t 0 , t 1 ] , we obtain
E { V ( t ) } E { V ( t 0 + ) } e ς 2 ( t t 0 ) ,
As t ( t 1 , t 2 ] ,
E { V ( t 1 + ) } ς 1 E { V ( t 1 ) } + υ ς 1 E { V ( t 0 + ) } e ς 2 ( t 1 t 0 ) + υ ,
E { V ( t ) } E { V ( t 1 + ) } e ς 2 ( t t 1 ) ς 1 E { V ( t 0 + ) } e ς 2 ( t t 0 ) + υ e ς 2 ( t t 1 ) .
Demonstration of identical procedure indicates that for t ( t k , t k + 1 ] ,
E { V ( t ) } ς 1 k E { V ( t 0 + ) } e ς 2 ( t t 0 ) + ς 1 k 1 υ e ς 2 ( t t 1 ) + ς 1 k 2 υ e ς 2 ( t t 2 ) + + υ e ς 2 ( t t k ) ς 1 k E { V ( t 0 + ) } e ς 2 ( t t 0 ) + ς 1 k 1 υ e ς 2 ( t t 0 h ̲ ) + ς 1 k 2 υ e ς 2 ( t t 0 2 h ̲ ) + + υ e ς 2 ( t t 0 k h ̲ ) ς 1 k E { V ( t 0 + ) } e ς 2 ( t t 0 ) + ς 1 k 1 υ e ς 2 ( t t 0 h ̲ ) + ς 1 k 2 υ e ς 2 ( t t 0 2 h ̲ ) + + υ e ς 2 ( t t 0 k h ̲ ) ς 1 k E { V ( t 0 + ) } e ς 2 ( t t 0 ) + υ e ς 2 ( t t 0 ) e k ln ς 1 ( ln ς 1 + ς 2 h ̲ ) ( 1 e k ( ln ς 1 + ς 2 h ̲ ) ) 1 e ( ln ς 1 + ς 2 h ̲ ) ) e ( 1 h ¯ ln ς 1 + ς 2 ) ( t t 0 ) E { V ( t 0 + ) } + υ e 1 h ¯ ln ς 1 + ς 2 ( t t 0 ) e ( ln ς 1 + ς 2 h ̲ ) υ e ( ln ς 1 + ς 2 h ̲ ) 1 e ( ln ς 1 + ς 2 h ̲ ) .
By Equations (15) and (17), the following can be derived:
E { ε ( t ) 2 } 1 λ 1 E { V ( t ) } υ e ( ln ς 1 + ς 2 h ̲ ) λ 1 ( e ( ln ς 1 + ς 2 h ̲ ) 1 ) .
With Definition 1, the error bound ρ can be chosen as υ e ( ln ς 1 + ς 2 h ̲ ) λ 1 ( e ( ln ς 1 + ς 2 h ̲ ) 1 ) 1 2 . And the MGST of the multi-agent systems (9) can be achieved. This concludes the proof. □
Remark 6.
In this paper, we integrate event-triggered scheme, impulsive signal, and multi-group tracking techniques to devise a comprehensive control approach that achieves MGST of multi-agent systems in UAV while addressing security issues such as the redundant interference signal, the communication interference of information and node connectivity interference signal.
Remark 7.
Theorem 1 provides a solution to the problem of event-triggered schemes in impulsive control. Other studies such as [22,31,32,33] rely on the Lyapunov function for event triggering, or establish triggering conditions that are difficult to solve for the triggering instants. In contrast, this study deduces upper and lower bounds for the triggering instants and extends the traditional event-triggered scheme to impulsive control for multi-agent systems. Furthermore, the classic event-triggered scheme is improved and generalized with features like PRT, EAT, LR, and SDT, making it more versatile and intelligent.
Remark 8.
Suppose that a different type of network interference destroys certain nodes rather than altering the coupling strength, which we refer to as node connectivity interference signals. In UAV applications, the connectivity of nodes is sometimes disrupted by network interference. Assuming that the controller has some anti-interference capabilities, such that while the destroyed nodes can impact coupling between other nodes, the influence remains limited and in the topology graph G , there still exists a directed spanning tree. The changes to the topology under this form of network interference depend on the intensity of the attack, and we employ an integer σ ( t ) in a finite set Ω = { 1 , 2 , , } of switches to characterize these changes, where different changes correspond to different switching modes. Specifically, let G σ ( t ) contain a directed spanning tree where σ ( t ) denotes the switching variable, then the controller’s expression is given by
u i ( t ) = k = 1 γ p i ( t k ) δ ( t t k ) , i = 1 , 2 , , N .
with
p i ( t ) = j N i a i j σ ( t ) ( x j ( t ) x i ( t ) x j * x i * + k v v j t v i t ) + θ i ( t ) m i ( t ) + b i [ ( x l t x i ( t ) + x i * k v v i t v l t ] ,
Then the error dynamics can be rewritten as
ε ˙ ( t ) = A ε ( t ) + F ˇ ( t ) , t ( t k , t k + 1 ] , Δ ε t k = C ( σ ( t ) ) ε t k + ϑ ( t ) , t = t k ,
where C ( σ ( t ) ) = 0 q N 0 q N ( γ μ ˇ l ( t ) L σ ( t ) + B ) I q ( γ k v μ ˇ ( t ) L σ ( t ) + B ) I q . Consequently, the following theorem can be established.
For simplicity, the variables related to σ ( t ) are denoted as variables related to ı in Theorem 2.
Theorem 2.
Assuming that Assumptions 1–3 hold. For systems (30) under the impulsive event-triggered controller (28), we define given scalars c 0 0 , c 1 , c 2 , c 3 , c 4 , c 5 > 0 , 0 < h ̲ < h ¯ , 0 < θ < 1 , 0 < μ ̲ < μ ¯ , m ^ , 0 < λ 1 < λ 2 , any γ > 0 , and κ > 0 . Then, if there exist positive definite matrices P and diagonal positive definite matrices Λ with suitable dimensions, as well as a positive constant ς 2 , such that
1 h ¯ ln ς 1 𝚤 + ς 2 < 0 , 𝚤 Ω ,
P A + A T P + S Λ S ς 2 P P P Λ < 0 ,
λ 1 I P λ 2 I ,
where ς 1 𝚤 = ( 1 + κ ) λ m a x [ I + S y m { C 𝚤 T I } + C 𝚤 T C 𝚤 ] , S = d i a g { s 1 , s 2 , , s q } I N , μ 1 = μ ̲ + μ ¯ 2 , μ 2 = μ ̲ 2 + μ ̲ μ ¯ + μ ¯ 2 2 . The systems (9) of UAV with network interference can achieve MGST.
Proof of Theorem 2.
Similar to the process of Theorem 1, the proof can be completed. □

3. Results

Example 1.
We consider a multi-agent system with 12 nodes in UAV, which are divided into 3 group. Their grouping and connectivity are shown in Figure 3. The function for leaders of each subgroup is selected as f l t , v i ( t ) = κ l * sin ( t ) + v i ( t ) , cos ( t ) + v i ( t ) , cos ( t ) + v i ( t ) , l V L . where κ 1 = 6 , κ 2 = 8 , and κ 3 = 10 . The initial positions x l of the followers are situated at the cross icon position in Figure 4. The distributed impulsive protocol is described in Equation (3) with k v = 0.2 . The Laplacian matrix L can be obtained from the communication topology graph presented in Figure 3, where the weight of inter-subgraph coupling edges is chosen as a constant value of 1. The given conditions of multi-agent systems are as follows: g l 0 , v i ( 0 ) = 0 , γ = 0.5 , c 0 = 2 , c 1 = 3 , c 2 = 2 , c 3 = 0.1 , c 4 = 0.1 , c 5 = 2 , θ = 0.5 , λ 1 = 1 , λ 2 = 150 , κ = 0.5 , h ̲ = 0.02 , μ ̲ = 0.7 , μ ¯ = 1.1 , m ^ = 10 . After numerical simulation, Figure 4, Figure 5 and Figure 6 can be obtained. In Figure 4, the blue represents the trajectories of the followers, while the magenta represents the trajectory of the leaders. Setting the time triggering parameters c 0 , c 1 , c 2 , c 3 , c 4 , and c 5 as described above, we obtain the time triggering situation as shown in Figure 6. Under such control, the tracking target of the system is achieved as Figure 4. It can be seen that the followers in the multi-agent system track the leaders and achieve the goal of safe tracking. All agents’ trajectories converge into three subgroups with the desired configuration. And the nodes in the initial state followed the path of the leaders, and due to the influence of network interference, there was a small amount of error between the tracking trajectory and the leaders, but this is still within the set error boundary range, which is shown in Figure 5. Figure 5 shows the position error and error boundary of each node. In order to better demonstrate the role of event-triggered mechanisms in regulating triggering frequency, we changed the event-triggering parameters c 0 = 2 , c 1 = 3 to c 0 = 3 , and c 1 = 4 , and obtained Figure 7, which shows the acceleration of the number of triggers, indicating the regulating effect of the trigger. We again selected the triggering parameter c 0 = 0 and obtained Figure 8, which is a linear triggering situation, indicating that our designed trigger can realize the linear triggering scenario.
Example 2.
Here, we consider a multi-agent system with 12 follower nodes in UAV, where three groups of nodes are, respectively, nodes 1, 2, 3, nodes 4, 5, 6, 7, and nodes 7, 8, 9, 10, 11, 12. We randomly set their initial positions. In practical scenarios, network interference can often disrupt the topology of nodes in a multi-agent system. Therefore, we have considered this factor and set up four types of topological structures for the node structure after such disruptions. These structures are shown in Figure 9. We adopt the Markov switching methodology introduced in reference [34], which requires σ ( t ) to satisfy a transition condition, with the transition matrix being Π = 8 1 5 2 1 5 2 2 2 2 5 1 1 2 3 6 . By setting up these different topological structures, we can explore how network interference affects the performance of the multi-agent system under different conditions. The given conditions of multi-agent systems are as follows: γ = 0.4 , c 0 = 1 , c 1 = 2 , c 2 = 3 , c 3 = 0.2 , c 4 = 0.2 , c 5 = 3 , θ = 0.4 , λ 1 = 2 , λ 2 = 160 , κ = 0.4 , h ̲ = 0.01 , μ ̲ = 0.5 , μ ¯ = 1 , m ^ = 15 . Other parameters are consistent with Example 1. We conducted numerical simulations and obtained Figure 10 and Figure 11. Figure 10 shows the trajectory status tracked within 8 s. It can be seen that the nodes in the initial state followed the path of the leaders, and due to the influence of network interference, there was a small amount of error between the trajectory and the leaders, but this is still within the set error boundary range, which is shown in Figure 11. Figure 11 shows the position error and error boundary of each node.

4. Discussion

This study discusses the multi-group tracking problem of multi-agent systems in UAV, in which a combined control technique of impulsive control and event-triggered scheme is considered, various network interference phenomena of UAV are involved. In the tracking problem of UAV, to better achieve control over different tracking targets, the agents are divided into multiple groups. Each group carries out different action planning and trajectory tracking based on its own characteristics and needs in order to achieve their respective tracking goals. This grouping method helps to reduce complexity and make the control of multi-agent systems in UAV more efficient and precise. Additionally, grouping can also be used to ensure the stability of the system of UAV, avoiding control conflicts and adverse effects caused by a single control target. Therefore, in the proposed solution for the multi-group tracking problem in this paper, the agent grouping is an important consideration factor, which directly relates to the control effectiveness and operation quality of the multi-agent system in UAV. In the control process, a combination of event-triggered scheme and impulsive control technique is used to better meet the control needs of multi-agent systems. Unlike traditional periodic control methods, this control scheme utilizes event triggering to control agents, which can help avoid unnecessary communication and calculation costs in UAV while satisfying a certain error range, effectively improving the control efficiency of multi-agent systems. Additionally, when considering the event-triggered scheme, we introduce adjustable triggering parameters, allowing for the certain adjustment of triggering conditions based on actual situations, achieving more flexible control. These features make the proposed control technique not only suitable for multi-group UAV’s control problems but also for other types of intelligent control problems. When considering network interference in UAV, direct interference with the control signal, generation of control redundancy interference, and interference that disrupts the network topology structure are involved. The control techniques for multi-agent systems of UAV discussed in this paper could better cope with network interference behaviors. In practical control operations in UAV, network interference is inevitable and may disrupt the normal operation of a multi-agent system. Therefore, effective measures must be taken to address these interference behaviors. This study proposes a combined control technique of impulsive signal and event triggering while considering various forms of network interference, such as direct impact on control signals (the redundant interference signal), generation of control redundancy (the communication interference of information), and disruption of network topology structure (node connectivity interference signal). The application of these techniques can improve the anti-interference ability of UAV, ensuring their stable operation in complex environments. Additionally, the research findings will provide some reference value for future intelligent control technology and network control theory.

5. Conclusions

Simulating a multi-group target mechanism with UAV, this study investigates multi-group tracking control in multi-agent systems of UAV, as opposed to single-target tracking control compared to the existing studies [18,25], in which integrating event-triggered mechanisms and impulsive signals into multi-group tracking control is indeed an interesting approach. This integration provides a unique and effective way to address complex cooperative control challenges in multi-agent systems. Moreover, different from the classical event-triggered scheme, a novel event-triggered protocol has been proposed, which encompasses numerous scenarios identified in prior research studies such as [26,27,28,32,34,35], while also possessing new advantages of PRT, EAT, LR, and SDT described in Remarks 1–3. In addition, we have taken into account several types of network interference caused by UAVs, as described below Equation (5) and in Remark 8. These considerations enable us to effectively address specific forms of network interference and disruptions. Furthermore, we have derived corresponding MGST criteria for multi-agent systems employing this control protocol. In future work, we will build upon existing studies [36,37] to explore the rapid convergence tracking control and robust fault-tolerant mechanisms of UAVs. Additionally, we will address the secure and smart control issues of multi-agent systems in UAVs under increasingly complex and practical cyber-security scenarios during the tracking process, while also exploring other challenges that arise in the data communication process. Additionally, we aim to incorporate intelligent communication behaviors into our proposed controller and optimization algorithms for event-triggered schemes to enable smarter tracking control.

Author Contributions

Conceptualization, C.Z. and K.S.; methodology, C.Z. and K.S.; software, K.S. and C.Z.; validation, K.S.; writing—original draft, C.Z., N.H. and J.X.; writing—review and editing, C.Z., K.S., N.H. and J.X.; visualization, C.Z.; supervision, Y.T. and J.X.; funding acquisition, C.Z. All authors have read and agreed to the published version of the manuscript.

Funding

Our work in this paper was supported by the Guangdong Basic and Applied Basic Research Foundation (2021A1515110946), the Natural Science Foundation of Sichuan Province (2022NSFSC1822), the Program of Science and Technology of Sichuan Province of China (2021ZYD0012, 2022NSFSC0532), the Key R&D Projects of Sichuan Provincial Department of Science and Technology (2023YFG0287) and Sichuan Natural Science Youth Fund Project (2023NSFSC1366).

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

We have no conflict of interest with any individual or organization regarding this paper.

References

  1. Shi, Z.; He, J.; Wang, T.; Zhou, C.; Jian, G. Optimal formation control and collision avoidance in environment with multiple rectangle obstacles. J. Frankl. Inst. 2018, 355, 7626–7642. [Google Scholar] [CrossRef]
  2. Han, L.; Dong, X.; Li, Q.; Ren, Z. Formation tracking control for time-delayed multi-agent systems with second-order dynamics. Chin. J. Aeronaut. 2017, 30, 348–357. [Google Scholar] [CrossRef]
  3. Qi, J.; Zhang, J.; Ding, Y. Wave Equation-Based Time-Varying Formation Control of Multiagent Systems. IEEE Trans. Control Syst. Technol. 2018, 26, 1578–1591. [Google Scholar] [CrossRef]
  4. Liu, Y.; Yu, H.; Shi, P.; Lim, C.C. Formation control and collision avoidance for a class of multi-agent systems. J. Frankl. Inst. 2019, 356, 5395–5420. [Google Scholar] [CrossRef]
  5. Shi, L.; Li, W.; Shi, M.; Shi, K.; Cheng, Y. Opinion Polarization over Signed Social Networks with Quasi Structural Balance. IEEE Trans. Autom. Control 2023, Early Access, 1–8. [Google Scholar] [CrossRef]
  6. Shi, L.; Liu, Q.; Shao, J.; Cheng, Y.; Zheng, W. A Cooperation-Competition Evolutionary Dynamic Model over Signed Networks. IEEE Trans. Autom. Control 2023, Early Access, 1–8. [Google Scholar] [CrossRef]
  7. Shi, L.; Zheng, W.X.; Shao, J.; Chen, Y.H. Sub/super-stochastic matrix with applications to bipartite tracking control over signed networks. SIAM J. Control Optim. 2021, 59, 4563–4589. [Google Scholar] [CrossRef]
  8. Shi, L.; Cheng, Y.; Shao, J.; Sheng, H.; Liu, Q. Cucker-Smale Flocking over Cooperation-Competition Networks. Automatica 2022, 135, 109988. [Google Scholar] [CrossRef]
  9. Bennet, D.J.; McInnes, C.R. Pattern transition in spacecraft formation flying using bifurcating potential fields. Aerosp. Sci. Technol. 2012, 23, 250–262. [Google Scholar] [CrossRef] [Green Version]
  10. Antonelli, G.; Arrichiello, F.; Chiaverini, S. Experiments of Formation Control with Multirobot Systems Using the Null-Space-Based Behavioral Control. IEEE Trans. Control Syst. Technol. 2009, 17, 1173–1182. [Google Scholar] [CrossRef] [Green Version]
  11. Ji, H.M.; Lee, H.J. Decentralized observer-based output-feedback formation control of multiple unmanned underwater vehicles. J. Electr. Eng. Technol. 2018, 13, 493–500. [Google Scholar]
  12. Zhong, Q.; Han, S.; Shi, K.; Zhong, S.; Kwon, O.-M. Co-Design of Adaptive Memory Event-Triggered Mechanism and Aperiodic Intermittent Controller for Nonlinear Networked Control Systems. IEEE Trans. Circuits -Syst.—II Express Briefs 2022, 69, 4979–4983. [Google Scholar] [CrossRef]
  13. Yang, S.; Xi, L. Quadrotor formation control method based on graph and consistency theory. J. Robot. Netw. Artif. Life 2018, 3, 54–61. [Google Scholar]
  14. Shibata, N.; Kubota, H.; Fujimori, A.; Tezuka, Y. Leader-follower formation control with obstacle avoidance using sonar-equipped mobile robots. Proc. Inst. Mech. Eng. J. Syst. Control Eng. 2014, 228, 303–315. [Google Scholar]
  15. Dong, X.; Li, Q.; Zhao, Q.; Ren, Z. Time-varying group formation analysis and design for second-order multi-agent systems with directed topologies. Neurocomputing 2016, 205, 367–374. [Google Scholar] [CrossRef] [Green Version]
  16. Han, T.; Guan, Z.-H.; Chi, M.; Hu, B.; Li, T.; Zhang, X.-H. Multi-formation control of nonlinear leader-following multi-agent systems. ISA Trans. 2017, 69, 140–147. [Google Scholar] [CrossRef] [PubMed]
  17. Li, X.; Peng, D.; Cao, J. Lyapunov Stability for Impulsive Systems via Event-Triggered Impulsive Control. IEEE Trans. Autom. Control 2020, 65, 4908–4913. [Google Scholar] [CrossRef]
  18. Zhao, C.; Liu, X.; Zhong, S.; Shi, K.; Liao, D.; Zhong, Q. Secure consensus of multi-agent systems with redundant signal and communication interference via distributed dynamic event-triggered control. ISA Trans. 2021, 112, 89–98. [Google Scholar] [CrossRef]
  19. Li, W.; Sader, M.; Zhu, Z.; Liu, Z.; Chen, Z. Event-triggered fault-tolerant secure containment control of multi-agent systems through impulsive scheme. Inf. Sci. 2023, 622, 1128–1140. [Google Scholar] [CrossRef]
  20. Wu, Z.G.; Xu, Y.; Pan, Y.J.; Shi, P.; Wang, Q. Event-triggered pinning control for consensus of multiagent systems with quantized information. IEEE Trans. Syst. Man Cybern. Syst. 2017, 48, 1929–1938. [Google Scholar] [CrossRef]
  21. Xia, L.; Li, Q.; Song, R.; Ge, S.S. Distributed optimized dynamic event-triggered control for unknown heterogeneous nonlinear MASs with input-constrained. Neural Netw. 2022, 154, 1–12. [Google Scholar] [CrossRef]
  22. Ding, L.; Han, Q.-L.; Ge, X.; Zhang, X. An overview of recent advances in event-triggered consensus of multiagent systems. IEEE Trans. Cybern. 2017, 48, 1110–1123. [Google Scholar] [CrossRef] [Green Version]
  23. Cheng, Z.; Yue, D.; Hu, S.; Ge, H.; Chen, L. Distributed event-triggered consensus of multi-agent systems under periodic DoS jamming attacks. Neurocomputing 2020, 400, 458–466. [Google Scholar] [CrossRef]
  24. Wang, J.; Gao, J.; Wu, P. Attack-resilient event-triggered formation control of multi-agent systems under periodic DoS attacks using complex Laplacian. ISA Trans. 2022, 128, 10–16. [Google Scholar] [CrossRef] [PubMed]
  25. Yi, C.; Xu, C.; Feng, J.; Wang, J.; Zhao, Y. Leading-Following Consensus for Multi-Agent Systems with Event-Triggered Delayed Impulsive Control. IEEE Access 2019, 7, 136419–136427. [Google Scholar] [CrossRef]
  26. Cheng, Y.; Ugrinovskii, V. Event-triggered leader-following tracking control for multivariable multi-agent systems. Automatica 2016, 70, 204–210. [Google Scholar] [CrossRef] [Green Version]
  27. Zhou, J.; Zhu, J.W.; Zhang, W.-A.; Yu, L. Event-triggered dynamic output feedback tracking control for large-scale interconnected systems with disturbances. J. Frankl. Inst. 2019, 356, 10547–10563. [Google Scholar] [CrossRef]
  28. Wang, Y.; Gu, Y.; Xie, X.; Zhang, H. Delay-dependent distributed event-triggered tracking control for multi-agent systems with input time delay. Neurocomputing 2019, 333, 200–210. [Google Scholar] [CrossRef]
  29. Tan, X.; Cao, J.; Rutkowski, L. Distributed dynamic self-triggered control for uncertain complex networks with Markov switching topologies and random time-varying delay. IEEE Trans. Netw. Sci. Eng. 2019, 7, 1111–1120. [Google Scholar] [CrossRef]
  30. Ye, D.; Yang, X. Distributed event-triggered consensus for nonlinear multi-agent systems subject to cyber attacks. Inf. Sci. 2019, 473, 178–189. [Google Scholar] [CrossRef]
  31. Liu, B.; Sun, Z.; Luo, Y.; Zhong, Y. Uniform synchronization for chaotic dynamical systems via event-triggered impulsive control. Phys. Stat. Mech. Its Appl. 2019, 531, 121725. [Google Scholar] [CrossRef]
  32. Tan, X.; Cao, J.; Li, X. Consensus of leader-following multiagent systems: A distributed event-triggered impulsive control strategy. IEEE Trans. Cybern. 2018, 49, 792–801. [Google Scholar] [CrossRef] [PubMed]
  33. Liu, B.; Hill, D.J.; Sun, Z.; Huang, J. Event-triggered control via impulses for exponential stabilization of discrete-time delayed systems and networks. Int. J. Robust Nonlinear Control 2019, 29, 1613–1638. [Google Scholar] [CrossRef]
  34. Hu, W.; Liu, L.; Feng, G. Output consensus of heterogeneous linear multi-agent systems by distributed event-triggered/self-triggered strategy. IEEE Trans. Cybern. 2016, 47, 1914–1924. [Google Scholar] [CrossRef]
  35. Ge, X.; Han, Q. Distributed formation control of networked multi-agent systems using a dynamic event-triggered communication mechanism. IEEE Trans. Ind. Electron. 2017, 64, 8118–8127. [Google Scholar] [CrossRef]
  36. Liu, K.; Wang, R. Antisaturation Adaptive Fixed-Time Sliding Mode Controller Design to Achieve Faster Convergence Rate and Its Application. IEEE Trans. Circuits Syst. II Express Briefs 2022, 69, 3555–3559. [Google Scholar] [CrossRef]
  37. Liu, K.; Wang, R.; Zheng, S.; Dong, S.; Sun, G. Fixed-time disturbance observer-based robust fault-tolerant tracking control for uncertain quadrotor UAV subject to input delay. Nonlinear Dyn. 2022, 107, 2363–2390. [Google Scholar] [CrossRef]
Figure 1. Block diagram of the whole work of this study.
Figure 1. Block diagram of the whole work of this study.
Drones 07 00474 g001
Figure 2. Subgroups of the follower nodes and the leaders in UAV.
Figure 2. Subgroups of the follower nodes and the leaders in UAV.
Drones 07 00474 g002
Figure 3. The topology of multi-agent systems with 3 subgroups in Example 1.
Figure 3. The topology of multi-agent systems with 3 subgroups in Example 1.
Drones 07 00474 g003
Figure 4. The tracking trajectory of multi-agent systems with 3 subgroups in Example 1.
Figure 4. The tracking trajectory of multi-agent systems with 3 subgroups in Example 1.
Drones 07 00474 g004
Figure 5. The position errors of all followers in Example 1.
Figure 5. The position errors of all followers in Example 1.
Drones 07 00474 g005
Figure 6. Event-triggered situation 1 of multi-agent systems in Example 1.
Figure 6. Event-triggered situation 1 of multi-agent systems in Example 1.
Drones 07 00474 g006
Figure 7. Event-triggered situation 2 of multi-agent systems in Example 1.
Figure 7. Event-triggered situation 2 of multi-agent systems in Example 1.
Drones 07 00474 g007
Figure 8. Event-triggered situation 3 of multi-agent systems in Example 1.
Figure 8. Event-triggered situation 3 of multi-agent systems in Example 1.
Drones 07 00474 g008
Figure 9. Switching modes of multi-agent systems in Example 2.
Figure 9. Switching modes of multi-agent systems in Example 2.
Drones 07 00474 g009
Figure 10. The tracking trajectory of multi-agent systems with 3 subgroups in Example 2.
Figure 10. The tracking trajectory of multi-agent systems with 3 subgroups in Example 2.
Drones 07 00474 g010
Figure 11. The position errors of all followers in Example 2.
Figure 11. The position errors of all followers in Example 2.
Drones 07 00474 g011
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhao, C.; Shi, K.; Tang, Y.; Xiao, J.; He, N. Multi-Group Tracking Control for MASs of UAV with a Novel Event-Triggered Scheme. Drones 2023, 7, 474. https://doi.org/10.3390/drones7070474

AMA Style

Zhao C, Shi K, Tang Y, Xiao J, He N. Multi-Group Tracking Control for MASs of UAV with a Novel Event-Triggered Scheme. Drones. 2023; 7(7):474. https://doi.org/10.3390/drones7070474

Chicago/Turabian Style

Zhao, Can, Kaibo Shi, Yiqian Tang, Jianying Xiao, and Nanrong He. 2023. "Multi-Group Tracking Control for MASs of UAV with a Novel Event-Triggered Scheme" Drones 7, no. 7: 474. https://doi.org/10.3390/drones7070474

Article Metrics

Back to TopTop