2018
DOI: 10.1007/s10514-018-9783-9
|View full text |Cite
|
Sign up to set email alerts
|

Distributed multi-robot formation control in dynamic environments

Abstract: This paper presents a distributed method for formation control of a homogeneous team of aerial or ground mobile robots navigating in environments with static and dynamic obstacles. Each robot in the team has a finite communication and visibility radius and shares information with its neighbors to coordinate. Our approach leverages both constrained optimization and multi-robot consensus to compute the parameters of the multi-robot formation. This ensures that the robots make progress and avoid collisions with s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
84
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 109 publications
(84 citation statements)
references
References 48 publications
0
84
0
Order By: Relevance
“…The formula is shown in Equation (3). F i (X) = AES(S N ID , i) + K i,CID * δ(X) = a n−1 X n−1 + a n−2 X n−2 + ... + a 1 X + a 0 (3) where S N ID is the private information held by each component, i is the time slot value, and {a 0 , a 1 , ..., a n−1 } is the polynomial coefficient. When the number of normal components in the cluster m is greater than the number of components being attacked, then n = m + 2; otherwise, n = p + 3.…”
Section: Key Update Instructionmentioning
confidence: 99%
See 1 more Smart Citation
“…The formula is shown in Equation (3). F i (X) = AES(S N ID , i) + K i,CID * δ(X) = a n−1 X n−1 + a n−2 X n−2 + ... + a 1 X + a 0 (3) where S N ID is the private information held by each component, i is the time slot value, and {a 0 , a 1 , ..., a n−1 } is the polynomial coefficient. When the number of normal components in the cluster m is greater than the number of components being attacked, then n = m + 2; otherwise, n = p + 3.…”
Section: Key Update Instructionmentioning
confidence: 99%
“…With the increasing application of multi-robot systems, there have been many studies in this field, including the study of robot motion trajectories [3], the cooperation of multi-robots [4], and robot safety research. This article focuses on the information security of multi-robot systems.…”
Section: Introductionmentioning
confidence: 99%
“…Classical global planner algorithms are, in general, no longer directly applicable. In these cases, it is necessary to implement alternative algorithms for navigation, such as wall‐ or corridor‐following (e.g., Pasteau, Narayanan, Babel, & Chaumette, ) based only on local information or specifically taking into account the walls, crosses, and lateral galleries that the robots encounter while navigating (Tardioli et al, ) or just relying on relative localization (Alonso‐Mora et al, ). Contrarily, the walls play a double role for the obstacle avoidance algorithms: They can help defining navigation goals and also represent obstacles to avoid.…”
Section: Challengesmentioning
confidence: 99%
“…Theorem 2. If system (14) is a directed graph and there is a spanning tree, the system can achieve consensus when the system delay τ d is smaller than the τ max under the action of noise ζ(t), and k 1 ∈ (0, k 0 k 2 2 ). Among them:…”
Section: Consensus Analysis Of Multi-robot With Various Delays and Nomentioning
confidence: 99%
“…As a result, they have better application prospects and higher research value in the fields of reconnaissance, patrol, rescue and environmental survey. Formation control of multi-mobile robots is the basis of multi-mobile robot systems, and has become a hotspot in the field of robotics [2].…”
Section: Introductionmentioning
confidence: 99%