Search results
1 – 4 of 4Ziyuan Ma, Huajun Gong and Xinhua Wang
The purpose of this paper is to construct an event-triggered finite-time fault-tolerant formation tracking controller, which can achieve a time-varying formation control for…
Abstract
Purpose
The purpose of this paper is to construct an event-triggered finite-time fault-tolerant formation tracking controller, which can achieve a time-varying formation control for multiple unmanned aerial vehicles (UAVs) during actuator failures and external perturbations.
Design/methodology/approach
First, this study developed the formation tracking protocol for each follower using UAV formation members, defining the tracking inaccuracy of the UAV followers’ location. Subsequently, this study designed the multilayer event-triggered controller based on the backstepping method framework within finite time. Then, considering the actuator failures, and added self-adaptive thought for fault-tolerant control within finite time, the event-triggered closed-loop system is subsequently shown to be a finite-time stable system. Furthermore, the Zeno behavior is analyzed to prevent infinite triggering instances within a finite time. Finally, simulations are conducted with external disturbances and actuator failure conditions to demonstrate formation tracking controller performance.
Findings
It achieves improved performance in the presence of external disturbances and system failures. Combining limited-time adaptive control and event triggering improves system stability, increase robustness to disturbances and calculation efficiency. In addition, the designed formation tracking controller can effectively control the time-varying formation of the leader and followers to complete the task, and by adding a fixed-time observer, it can effectively compensate for external disturbances and improve formation control accuracy.
Originality/value
A formation-following controller is designed, which can handle both external disturbances and internal actuator failures during formation flight, and the proposed method can be applied to a variety of formation control scenarios and does not rely on a specific type of UAV or communication network.
Details
Keywords
Mingke Gao, Zhenyu Zhang, Jinyuan Zhang, Shihao Tang, Han Zhang and Tao Pang
Because of the various advantages of reinforcement learning (RL) mentioned above, this study uses RL to train unmanned aerial vehicles to perform two tasks: target search and…
Abstract
Purpose
Because of the various advantages of reinforcement learning (RL) mentioned above, this study uses RL to train unmanned aerial vehicles to perform two tasks: target search and cooperative obstacle avoidance.
Design/methodology/approach
This study draws inspiration from the recurrent state-space model and recurrent models (RPM) to propose a simpler yet highly effective model called the unmanned aerial vehicles prediction model (UAVPM). The main objective is to assist in training the UAV representation model with a recurrent neural network, using the soft actor-critic algorithm.
Findings
This study proposes a generalized actor-critic framework consisting of three modules: representation, policy and value. This architecture serves as the foundation for training UAVPM. This study proposes the UAVPM, which is designed to aid in training the recurrent representation using the transition model, reward recovery model and observation recovery model. Unlike traditional approaches reliant solely on reward signals, RPM incorporates temporal information. In addition, it allows the inclusion of extra knowledge or information from virtual training environments. This study designs UAV target search and UAV cooperative obstacle avoidance tasks. The algorithm outperforms baselines in these two environments.
Originality/value
It is important to note that UAVPM does not play a role in the inference phase. This means that the representation model and policy remain independent of UAVPM. Consequently, this study can introduce additional “cheating” information from virtual training environments to guide the UAV representation without concerns about its real-world existence. By leveraging historical information more effectively, this study enhances UAVs’ decision-making abilities, thus improving the performance of both tasks at hand.
Details
Keywords
Livio Cricelli, Roberto Mauriello and Serena Strazzullo
This study aims to analyse how the adoption of Industry 4.0 technologies can help different types of agri-food supply chains introduce and manage innovations in response to the…
Abstract
Purpose
This study aims to analyse how the adoption of Industry 4.0 technologies can help different types of agri-food supply chains introduce and manage innovations in response to the challenges and opportunities that emerged following the COVID-19 pandemic.
Design/methodology/approach
A systematic literature review methodology was used to bring together the most relevant contributions from different disciplines and provide comprehensive results on the use of I4.0 technologies in the agri-food industry.
Findings
Four technological clusters are identified, which group together the I4.0 technologies based on the applications in the agri-food industry, the objectives and the advantages provided. In addition, three types of agri-food supply chains have been identified and their configuration and dynamics have been studied. Finally, the I4.0 technologies most suited for each type of supply chain have been identified, and suggestions on how to effectively introduce and manage innovations at different levels of the supply chain are provided.
Originality/value
The study highlights how the effective adoption of I4.0 technologies in the agri-food industry depends on the characteristics of the supply chains. Technologies can be used for different purposes and managers should carefully consider the objectives to be achieved and the synergies between technologies and supply chain dynamics.
Details
Keywords
Mikias Gugssa, Long Li, Lina Pu, Ali Gurbuz, Yu Luo and Jun Wang
Computer vision and deep learning (DL) methods have been investigated for personal protective equipment (PPE) monitoring and detection for construction workers’ safety. However…
Abstract
Purpose
Computer vision and deep learning (DL) methods have been investigated for personal protective equipment (PPE) monitoring and detection for construction workers’ safety. However, it is still challenging to implement automated safety monitoring methods in near real time or in a time-efficient manner in real construction practices. Therefore, this study developed a novel solution to enhance the time efficiency to achieve near-real-time safety glove detection and meanwhile preserve data privacy.
Design/methodology/approach
The developed method comprises two primary components: (1) transfer learning methods to detect safety gloves and (2) edge computing to improve time efficiency and data privacy. To compare the developed edge computing-based method with the currently widely used cloud computing-based methods, a comprehensive comparative analysis was conducted from both the implementation and theory perspectives, providing insights into the developed approach’s performance.
Findings
Three DL models achieved mean average precision (mAP) scores ranging from 74.92% to 84.31% for safety glove detection. The other two methods by combining object detection and classification achieved mAP as 89.91% for hand detection and 100% for glove classification. From both implementation and theory perspectives, the edge computing-based method detected gloves faster than the cloud computing-based method. The edge computing-based method achieved a detection latency of 36%–68% shorter than the cloud computing-based method in the implementation perspective. The findings highlight edge computing’s potential for near-real-time detection with improved data privacy.
Originality/value
This study implemented and evaluated DL-based safety monitoring methods on different computing infrastructures to investigate their time efficiency. This study contributes to existing knowledge by demonstrating how edge computing can be used with DL models (without sacrificing their performance) to improve PPE-glove monitoring in a time-efficient manner as well as maintain data privacy.
Details