Severity: Warning
Message: file_get_contents(https://...@gmail.com&api_key=61f08fa0b96a73de8c900d749fcb997acc09&a=1): Failed to open stream: HTTP request failed! HTTP/1.1 429 Too Many Requests
Filename: helpers/my_audit_helper.php
Line Number: 176
Backtrace:
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 176
Function: file_get_contents
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 250
Function: simplexml_load_file_from_url
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 1034
Function: getPubMedXML
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 3152
Function: GetPubMedArticleOutput_2016
File: /var/www/html/application/controllers/Detail.php
Line: 575
Function: pubMedSearch_Global
File: /var/www/html/application/controllers/Detail.php
Line: 489
Function: pubMedGetRelatedKeyword
File: /var/www/html/index.php
Line: 316
Function: require_once
Time-varying group formation-containment tracking problems for general linear multiagent systems with unknown control input are investigated. Agents are classified into tracking leaders, formation leaders, and followers and assigned in groups. Tracking leaders with unknown control inputs provide unpredictable trajectories as macroscopic moving references. Formation leaders accomplish desired subformations while following the trails of tracking leaders. At the same time, followers converge into different convex hulls spanned by formation leaders. First, formation-containment tracking protocols are designed with neighboring relative information and effects of unknown input of tracking leaders. Then, the design of group division is analyzed by adjusting the properties in Laplacian matrices, which represent interaction relationships. An algorithm to determine the parameters in control protocols is proposed, and the formation tracking feasible constraint is presented. Next, it is proved that the general linear multiagent system can achieve time-varying group formation-containment control effectively with errors uniformly asymptotically converging to zero under designed protocols. Finally, a numerical simulation is given to verify the effectiveness of obtained theoretical results.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1109/TCYB.2021.3058086 | DOI Listing |
Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!