Control of Multi-Agent Systems with Event-Triggered Cloud Access

Size: px
Start display at page:

Download "Control of Multi-Agent Systems with Event-Triggered Cloud Access"

Transcription

1 Control of Multi-Agent Systems with Event-Triggered Cloud Aess Antonio Adaldo, Davide Liuzza, Dimos V. Dimarogonas, and Karl H. Johansson Abstrat This paper investigates a multi-agent formation ontrol problem with event-triggered ontrol updates and additive disturbanes. The agents ommuniate only by exhanging information in a loud repository. The ommuniation with the loud is onsidered a shared and limited resoure, and therefore it is used intermittently and asynhronously by the agents. The proposed approah takes advantage of having a shared asynhronous loud support while guaranteeing a redued number of ommuniation. More in detail, eah agent shedules its own sequene of loud aesses in order to ahieve a oordinated network goal. A ontrol law is given with a riterion for sheduling the ontrol updates reursively. The losed loop sheme is proven to be effetive in ahieving the ontrol objetive and a numerial simulation orroborates the theoretial results. I. ITRODUCTIO The study of networked ontrol systems CS) is motivated by the fat that, nowadays, heterogeneous and geographially distributed devies an be onneted with heap and reliable wireless tehnologies. Speifially, onsensus algorithms have been investigated [1], [2] and tailored for platooning and formation ontrol [3], [4]. On the other hand, several reent papers onsider the possibility of distributed wireless sensors and atuators in CS, devoting the researh effort in oordinating the data pakets and guaranteeing desired performanes [5], [6]. Motivated by the need of saving hardware and software resoures and reduing the transmitted data, event-triggered and self-triggered ontrol strategies have been introdued [7] [9], and later extended to multi-agent oordination [10] [12]. These strategies do not require a fixed sampling period for the feedbak loop, but the ontrol input is updated only when a speifi ondition related to the stability or to some ontrol performane is violated. In the urrent paper a novel event-sheduled loud aess approah is introdued to solve the problem of formation ontrol for a fleet of systems modeled with simple integrator dynamis. We onsider a setup where eah agent proesses information loally. However, all the agents use the same ommuniation hannel and database hosted in the loud, whih are both shared resoures. The loud keeps a redued entralized amount of information and an be aessed by the agents in an asynhronous way under a publish subsribe paradigm [13], [14]. Basially, the agents an intermittently read/write information on the loud in an asynhronous way, while being in an idle mode no ommuniation and no The authors are with the ACCESS Linneaus Center and Shool of Eletrial Engineering, Royal Institute of Tehnology, Stokholm, Sweden. This work was partly supported by the Swedish Researh Counil and the Knut oh Alie Wallenberg Foundation. omputing) between any two onseutive aesses. Suh ontrol infrastruture appears partiularly onvenient when ommuniation onstraints severely limit the possibility of a diret exhange of information among agents. The use of shared resoures hosted in the loud is widely studied in omputer siene, where problems suh as loud aess management, resoure alloations ontrol and ontent deliver are studied [15], [16], while reently the sheduling of a ommon omputational resoure for ontrol system arhitetures has also been onsidered [17], [18]. As motivating example, we onsider the problem of waypoint generation for ontrol formation of a fleet of autonomous underwater vehiles AUVs) [19] [21]. For this kind of agents the ommuniation problems are indeed partiularly severe. Speifially, underwater ommuniation is ahieved by means of expensive and power hungry aousti modems and it is onsiderably limited both in range and bandwidth [19]. Furthermore, the GPS signal is interdited when the vehile is underwater and aurate inertial platforms are expensive. Aousti positioning by means of baselines is also diffiult to be adopted in wide open sea senarios. For this reason, in low ost appliations the AUVs are supposed to now and then surfae to get their exat feedbak position by GPS in order to ompensate the effet of oean urrents and external disturbanes. This kind of senario is onsidered in [22], [23] where, taking advantage of periodi surfaing, wireless ommuniation is used. However, the drawbak is that all AUVs have to surfae at the same instant in order to ommuniate with a leader and reeive the next waypoint in terms of time and position). Furthermore, the marine urrent disturbane is supposed to be the same for all the agents, thus resulting in onservative results when agents are far from eah other, possibly experiening different sea onditions. The main ontribution if this paper is to introdue an asynhronous loud aess for the ontrol system and we exploit a shared database to oordinate a formation of AUVs on the horizontal plane. Speifially, eah vehile surfaes asynhronously with respet to the others, gets its urrent GPS position and a foreast on the maritime onditions related to its region. Using this information, the AUV omputes its new ontrol input and its next surfaing instant. Then, it uploads this new information on the loud and starts a new underwater navigation segment without being able to ommuniate or to get GPS until its next surfaing. ote that, between any two onseutive surfaing intstants, the others ould possibly surfae an arbitrary number of times, thus hanging their ontrol inputs without the AUVs underwater being able to detet suh hange. However, despite the pres-

2 ene of asynhronous and outdated information, we prove that adopting a suitable sheduling rule the fleet onverges to the desired formation keeping a residual error within a given bound. The rest of this paper is organized as follows. In Setion II some notations and bakground onepts are introdued. In Setion III the mathematial model of the multi-agent system is presented, the ontrol objetive is defined and the proposed ontrol algorithm is outlined. In Setion IV suffiient onditions for ahieving the ontrol objetive are identified and in Setion V it is shown how these onditions are attained by sheduling the ontrol updates in an opportunist way. Setion VI shows the appliation of the proposed algorithm to a simulated vehile formation problem. Setion VII onludes the paper with some possible future developments. A. otation II. PRELIMIARIES For any n, 1 n denotes the vetor in R n whose entries are all equal to one, while I n denotes the identity matrix of order n. Operator used on a vetor denotes the Eulidean norm, while if used on a matrix denotes the orresponding indued norm. Operator denotes the Kroneker produt. For the definition and properties of this operator see for example [24]. B. Graph Theory For the purposes of this paper a graph is a tuple G = V,E ) made up of a set V = 1,...,} of nodes and a set E of edges onneting distint nodes. The edge onneting nodes i and j is denoted as i, j) or j,i) indifferently. For eah node i V, the set V i = j V : i, j) E } of the nodes that are onneted to node i by an edge is alled the neighborhood of node i and the nodes j V i are alled neighbors of node i. The number of neighbors d i of a node i is alled the degree of that node. A path between nodes i and j is defined as a sequene i,k 1,...,k m, j of nodes suh that any two onseutive nodes in the sequene are onneted by an edge. A graph is said to be onneted if all possible pairs of nodes are onneted by a path. The matrix A = } a i j suh that 1 if i, j) E a i j = 0 otherwise is alled adjaeny matrix of the graph, the matrix D = diagd 1,...,d } is alled degree matrix of the graph and finally the matrix L = D A is alled Laplaian matrix of the graph. The Laplaian matrix is symmetri and positive semidefinite and 1 is an eigenvetor with zero eigenvalue. Morevoer, the zero eigenvalue has multipliity one if and only if the graph is onneted [1]. Therefore in a onneted graph the eigenvalues of the Laplaian an be denoted as 0 = λ 1 < λ 2... λ. A graph is typially used to desribe networked multi-agent systems: eah node in the graph represents one agent in the network and an edge between nodes i and j represents a possible interation between the orresponding agents. III. SETUP DESCRIPTIO Consider a set of dynamial agents desribed by ẋ i t) = u i t) + ω i t), i = 1,...,, 1) with t 0 and x i t),u i t),ω i t) R n. Here x i t) is the state of agent i, u i t) is the ontrol input applied to it and ω i t) is a disturbane ating on it. Denoting we an rewrite 1) as xt) :=[x 1 t),...,x t) ], ut) :=[u 1 t),...,u t) ], ωt) :=[ω 1 t),...,ω t) ], ẋt) = ut) + ωt). 2) We onsider the rendezvous problem, i.e., the problem of driving the states of the agents lose to eah other in the state spae. More preisely, let xt) be the average of the agents states, xt) := 1 i=1 x i t), let e i t) be the mismath between the state of agent i and the average state, e i t) := xt) x i t), i = 1,...,, and ollet the signals e i t) into the stak vetor et) := [e 1 t),...,e t) ]. Definition 1: We say that the multi-agent system 1) ahieves pratial onsensus if lim sup et) ε, 3) t + where ε > 0 is a given positive onstant. We assume that the agents annot diretly ommuniate with eah other, but have aess to a shared database and a measurement system hosted on a loud. The ommuniation hannel between the agents and the loud is onsidered a shared resoure with limited throughput apaity, and therefore it must be used at disrete time instants and asynhronously by different agents. We onsider pieewise onstant ontrol signals with event-triggered updates. The time instants when agent i updates its ontrol input are denoted as t i,k, with k and we set t i,0 = 0. amely, we have u i t) = u i t i,k ) for t [t i,k,t i,k+1 ). For onveniene, we introdue the funtions l j t) orresponding to the latest update of u j ) before time t [11], l j t) = max t j,k : t j,k t } k ote in partiular that l i t i,k ) = k. It is assumed that when agent i onnets to the loud, say at time t = t i,k = t i,li t), it reeives a measurement of its urrent state xt i,k ), some information about the other agents stored in the database, and some estimate of the disturbanes to whih it is subjet.

3 i t i,li t) t 1,l1 t) t 2,l2 t)... t,l t) x i t i,li t)) x 1 t 1,l1 t)) x 2 t 2,l2 t))... x t,l t)) u i t i,li t)) u 1 t 1,l1 t)) u 2 t 2,l2 t))... u t,l t)) γ i,li t) γ 1,l1 t) γ 2,l2 t)... γ,l t) ρ i,li t) ρ 1,l1 t) ρ 2,l2 t)... ρ,l t) t i,li t)+1 t 1,l1 t)+1 t 2,l2 t)+1... t,l t)+1 TABLE I DATA STORED I THE SHARED DATABASE AT A GEERIC TIME t. Remark 2: The ontrol input u i t i,k ) an be omputed by agent i at time i by using only information downloaded from the loud at time t i,k. For the purposes of the forthoming analysis, onsider also the following signals, z i t) := a i j x j t) x i t)), 7) and the mismathes ũ i t) between a ontrol signal u i t) and the orresponding z i t), ũ i t) := u i t) z i t). 8) The estimate of the disturbanes is given in the form of two oeffiients γ i,k and ρ i,k suh that γ i,k t [t i,k,t i,k+1 ), ω i t) ˆω i,k t) := γ i,k + ρ i,k t t i,k+1 ) t t i,k+1. 4) Remark 1: Disturbane estimates 4) are different for different agents and for different update times of the same agent, taking into aount that disturbanes an vary both in time and spae within the operating region. The ase of a known global upper bound on the disturbanes an still be derived as a partiular ase, by setting γ i,k = γ and ρ i,k = 0 for all i = 1,..., and all k. This partiular model of disturbane estimation is inspired by our motivating example, desribed at the end of this setion. Agent i uses all suh information to ompute its new ontrol input u i t i,k ), and the time t i,k+1 of the next update. Before losing the onnetion to the loud, agent i uploads the values of t i,k, xt i,k ), ut i,k ), γ i,k, ρ i,k, and t i,k+1 on the shared database, so that they an be used later by other agents. Suh values may replae the orresponding old ones uploaded by agent i at the time of the previous onnetion, so that the dimension of the database does not inrease over time. Table I shows the data stored in the shared database at a generi time t. The ontrol signals are obtained as linear diffusive feedbak from other agents in the network. The topology of the interations is desribed by a graph G where eah node represents an agent and the edge i, j) represents a feedbak interation between agents i and j. amely, we set u i t) = a i j ˆx j t i,k ) x i t i,k ) ), t [t i,k,t i,k+1 ), 5) where A = a i j } is the adjaeny matrix of G, is a positive salar gain and ˆx j t i,k ) is an estimate of the state of agent j available at time t i,k. The estimate ˆx j t i,k ) are obtained by using the data available in the loud at time t i,k. amely, 1) is onsidered for agent j under null disturbanes, and it is integrated in the interval [t j,l j t i,k ),t), with t t j,l j t i,k )+1, yielding ˆx j t) = x j t j,l j t)) + u j t j,l j t))t t j,l j t)). 6) The setup proposed above is suitable to desribe a formation ontrol problem for a network of autonomous vehiles under strit ommuniation onstraints. The motivating example of the paper is the problem of a waypoint generation algorithm for a two-dimensional formation of AUVs. Eah agent represents a vehile, and the state of agent i is x i t) = p i t) b i R 2, where p i t) is the horizontal waypoint trajetory of vehile i, i.e. we do not are about the vertial oordinate, and b i is a onstant offset term with respet to the average point of the fleet, so it desribes the position assigned to vehile i within the formation. Sine radio ommuniation is interdited underwater no GPS and no relative information exhange an our), and sine we have assumed that the AUVs are not equipped with expensive sonar modems, the vehiles are ompletely isolated during the navigation, but that they an surfae at disrete time instants to exhange information with a remote repository hosted on a loud. The disturbanes inluded in the model aount for the marine urrents influening the motion of the vehiles. The position measurements may be obtained by GPS and the foreasts 4) on the marine urrents may be omputed from a MAFOR bulletin obtained from a wireless weather station. In fat, foreasts beome more onservative for more distant times in the future, a harateristi whih is embedded into model 4). The proposed ontrol algorithm is summarized below. The algorithm is initialized by setting, for all i V, t i,0 = 0, ˆx i 0) = x i 0) and u i 0) = a i j x j 0) x i 0)). Eah agent i V at eah update time t i,k performs the following operations. 1. Agent i onnets to the loud at time t = t i,k, as sheduled at time t i,k Agent i reeives the measurement of its urrent state x i t i,k ) and uploads it on the shared database. 3. From the database, agent i downloads t j,l j t i,k ), x j t j,l j t i,k )), u j t j,l j t i,k )), t j,l j t i,k )+1, γ j,l j t i,k ) and ρ j,l j t i,k ) for eah j V i. 4. Using x i t), t j,l j t i,k ), x j t j,l j t i,k )) and u j t j,l j t i,k )) for j V i, agent i omputes its new ontrol input u i t i,k ) aording to 5).

4 5. Agent i uploads its new ontrol input u i t i,k ) on the loud. 6. Agent i omputes the parameters γ i,k,ρ i,k by elaborating available information on the disturbanes, and uploads them on the loud. 7. Using γ i,k, t j,l j t i,k ), x j t j,l j t i,k )), u j t j,l j t i,k )), t j,l j t i,k )+1, γ j,l j t i,k ) and ρ j,l j t i,k ) for j V, agent i shedules the time t i,k+1 of its next update and uploads it on the loud. An appropriate sheduling rule will be given later in the paper. 8. Agent i disonnets from the loud and will be unable to ommuniate until its next update at time t i,k+1. When the partiular problem of AUVs oordination is onsidered, t i,k is the k-th surfaing instant for the i-th vehile, and step 8 orresponds to the underwater navigation segment between the surfaing times t i,k and t i,k+1. IV. PRACTICAL COSESUS In this setion our bounded onvergene result is derived. Later on, this result will be related to the sheduling of the ontrol updates. The following assumptions are needed. Assumption 1: The graph G that desribes the feedbak interations is onneted, and its Laplaian has eigenvalues 0 = λ 1 < λ 2... λ. Assumption 2: The disturbanes ω i t) ating on eah agent i = 1,..., are uniformly bounded by ω i t) Ω. Remark 3: Assumption 2 is not related to the estimation model 4). The upper bound Ω is not used in the disturbane estimation nor in sheduling and omputing the ontrol updates, and it is only introdued to haraterize the onvergene radius ε in 3). Assumption 3: There exists a threshold funtion σt) = σ 0 + σ 1 e λ σ t, with positive onstants σ 0, σ 1 and λ σ suh that at any time instant t 0 it holds that ũ i t) σt). 9) Remark 4: Assumption 3 an be fulfilled by sheduling the ontrol updates opportunely. This is shown in Setion V. Theorem 1: Consider the multi-agent system 1) under ontrols 5). Suppose Assumptions 1 to 3 hold. Then pratial onsensus is ahieved with ε = λ σ0 λ2 2 + Ω ) 10) Proof: Consider the following Lyapunov andidate funtion for the error stak vetor et) 1, V t) = et) L 2 I n )et), 11) where L is the Laplaian of the graph G that desribes the agents interations. Denoting zt) = [z 1 t),...,z t) ] 1 When a planar formation problem is onsidered, n = 2 we have zt) = L I n )xt) = L I n )et). 12) Sine L is symmetri we an write et) L 2 I n )et) =et) L I n ) 2 et) Hene, 11) an be rewritten as =L I n )et)) L I n )et)) =zt) zt) = zt) 2. V t) = zt). Consider now the dynamis of this andidate funtion along the system trajetories. Using 2) and 12) we an write żt) = L I n )ẋt) = L I n )ut) + ωt)). 13) ow denote so that we have ũt) = [ũ 1 t),...,ũ t) ], ut) = ũt) + zt), whih substituted into 13) yields Consequently, we have żt) = L I n )ũt) + zt) + ωt)). V t) = d dt zt) = zt) żt) zt) = zt) L I n )ũt) + zt) + ωt)) zt) 14) By the properties of the Kroneker produt and the Eulidean norm we have zt) L I n )zt) λ 2 zt) 2 zt) L I n )ũt) zt) λ ũt) zt) L I n )ωt) zt) λ ωt) Substituting these inequalities into 14) yields V t) λ 2 V t) + λ ũt) + λ ωt). 15) By Assumption 3 we have ũt) σt), whih substituted into 15) yields V t) λ 2 V t) + λ σt) + λ ωt). 16) Aounting for Assumptions 1 and 2, 16) implies that lim supv t) λ σ0 + Ω ) 17) t λ 2 ow observe that, from the Rayleigh-Ritz theorem [24], we have V t) = L I n )et) λ 2 et),

5 or equivalently et) V t) λ 2. 18) Therefore, using 17) into 18), and taking the limit for t +, we have lim sup et) λ ) σt) ωt) t + λ2 2 lim sup + t + λ σ0 λ2 2 + Ω ). Remark 5: The onvergene radius 10) an be arbitrarily redued by inreasing the ontrol gain, reduing the threshold σ 0 or onsidering a better onneted network, whih orresponds to a smaller ratio λ /λ 2 2. V. SCHEDULIG COTROL UPDATES In this setion we present our main result. Speifially, we give a riterion for reursive sheduling of the ontrol updates t i,k suh that Assumption 3 for Theorem 1 holds, and so pratial onsensus is ahieved. Denote ẑ i t) := a i j ˆx j t) ˆx i t)), 19) ẑt) :=[ẑ 1 t),...,ẑ t) ], α :=qσ 0, 20) βt) :=1 q)σ 0 + σ 1 e λ σ t, 21) where 0 < q < 1. Let us introdue the following funtions: ˆΩ i,k t) := ˆω i,k τ)dτ t i,k γ i,k t t i,k ) t [t i,k,t i,k+1 ), = γ i,k t t i,k ) ρ i,kt t i,k+1 ) 2 t t i,k+1, B i,k t) := ˆω j,l j t i,k )t) 2, uti,k ) R i, j,k t) :=max + σt i,k ), λ σt λ j,l 2 jti,k)+1) + B )} i,kt), S i,k t) := d i u i t i,k )t t i,k ) + j:t<t j,l j t i,k )+1 j: t t j,l j t i,k )+1 u j t j,l j t i,k ))t t i,k ) j: t t t j,l j t i,k )+1 j,l j t i,k )+1 ) u j t j,l j t i,k )) t j,l j ti,k )+1 t i,k R i, j,k τ) + στ)dτ, where d i is the degree of node i in the graph G. ow realling 20) and 21), onsider the following salars: T i, j,k =inf τ>t i,k : ˆΩ j,l j t i,k )τ) α }, 2d max T i,k =inf τ>t i,k : S i,k τ) βτ) }, where we denoted d := maxd 1,...,d }. With this notation, the ontrol updates are reursively sheduled as t i,k+1 = Ti, j,k,t i,k}. 22) min j V i i} The sheduling rule 22) introdues a degree of freedom in the hoie of the next onnetion t i,k+1 to the loud. Remark 6: The time instant t i,k+1 an be omputed by agent i at time t i,k by only using information available on the loud at time t i,k. In partiular, the values u i t i,k ) and u j t j,l j t i,k )) are diretly available, fr. Table I. Together with Remark 2, this implies that no entralized omputation is required to implement the proposed ontrol algorithm. The loud is only used as a data repository and it does not need to proess information. All the neessary omputing an be done by the agents in a deentralized way aessing the loud asynhronously. Remark 7: ote that ˆΩ i,k t i,k ) = 0 and S i,k t i,k ) = 0 for any k and for any i V. Morevoer, ˆΩt) and S i,k t) are ontinuous in t with upper-bounded slope. Sine α/d max is a positive onstant and βτ) is lower-bounded by a positive onstant, this implies that times T i, j,k and T i,k annot be infinitely lose to t i,k. Consequently the inter-update times t i,k+1 t i,k are lower-bounded by some positive onstant and the updates do not present aumulation points. Theorem 2: Consider the multi-agent system 1) under ontrols 5). Suppose Assumptions 1 and 2 hold and let the ontrol updates t i,k be sheduled aording to 22). Then pratial onsensus is ahieved with ε as in 10). Proof: We are going to prove that if the ontrol updates are sheduled aording to 22), then 9) holds for all the agents i V and at all the time instants t 0. Then we will obtain the thesis from Theorem 1. Sine t i,0 = 0 for all i V, we have ũ i 0) = 0 < σ0), and therefore at time zero 9) holds for all the agents. ow suppose by ontradition that at a finite time t some agent i attains ũ i t) > σt) for the first time, while ũ j τ) στ) for all τ [0,t) and all j V. Denote also k = l i t), i.e., let t i,k be the latest update for agent i before t. Adding and subtrating ẑ i t) on the right-hand side of 8) we obtain ũ i t) = ẑ i t i,k ) ẑ i t) + ẑ i t) z i t) ). Taking the norm of both sides and applying the triangular inequality yields ũ i t) ẑ i t i,k ) ẑ i t) + ẑ i t) z i t). 23) By the ontradiiton hypothesis we have ũ i t) > σt), therefore 23) implies σt) < ẑi t i,k ) ẑ i t) + ẑi t) z i t). 24)

6 First onsider the term ẑ i t) z i t). We have ẑ i t) z i t) = and onsequently a i j ˆx j t) ˆx i t) x j t)+x i t)), ẑ i t) z i t) d i ˆx i t) x i t) + ˆx j t) x j t). j V i 25) Consider now the terms ˆx j t) x j t). Integrating 1) in [t j,l j t i,k ),t), with t < t j,l j t i,k )+1, we have x j t) =x j t j,l j t i,k )) + u j t j,l j t i,k ))t t j,l j t i,k )) + t j,l j t i,k ) ω j τ)dτ. 26) On the other hand, ˆx j t) an be omputed as in 6). Therefore, using 6) and 26), we have ˆx j t) x j t) ω j τ)dτ ω j τ) dτ, t j,l j t i,k ) t j,l j t i,k ) whih by 4) also implies ˆx j t) x j t) ˆΩ j,l j t i,k )t). The same reasoning an be arried out for the term ˆx i t) x i t), yielding ˆx i t) x i t) ˆΩ i,k t). Substituting the two previous inequalities into 25) yields ẑ i t) z i t) d i ˆΩ i,k t) + j V i ˆΩ j,l j t i,k )t). Sine 22) is applied, we have ˆΩ i,k t) 2d α max, and onsequently α α ẑ i t) z i t) d i + d i α. 27) 2d max 2d max Consider now the term ẑt i,k ) ẑ i t) in 23). Realling 7) and noting that ˆx i t i,k ) = x i t i,k ), beause at time t i,k vehile i reeives the exat measurement of its state, we have ẑ i t i,k ) ẑ i t) = a i j ˆx j t i,k ) x i t i,k ) ˆx j t) + ˆx i t) ). 28) Fousing on the term ˆx i t) x i t i,k ), by 6) applied for j = i, we have ˆx i t) x i t i,k ) = u i t i,k )t t i,k ). 29) Similar reasoning an be applied to the terms ˆx j t i,k ) ˆx j t). However, sine the ontrol updates are asynhronous, u j τ) may be updated one or multiple times during the time interval [t i,k,t i,k+1 ). amely, in the time interval [t i,k,t j,l j t i,k )+1), u j has value u j t j,l j t i,k )), whih is available in the loud at time t i,k, but the possible future values assumed by u j τ) for τ t j,l j t i,k )+1 are unknown at time t i,k. Hene we an write ˆx j t) ˆx j t i,k ) = u j τ)dτ t i,k u j t j,l j t i,k ))t t i,k ) u j t j,l j t i,k )) t t j,l j t i,k )+1, = t j,l j t i,k )+1 t i,k ) + u j τ)dτ t > t j,l j t i,k )+1. t j,l j t i,k )+1 30) Substituting 29) and 30) into 28), taking norms of both sides, and applying the triangular inequality yields ẑi t i,k ) ẑ i t) di u i t i,k )t t i,k ) + j:t<t j,l j t i,k )+1 j:t t j,l j t i,k )+1 ut j,l j t i,k ))t t i,k ) j:t t t j,l j t i,k )+1 j,l j t i,k )+1 ) ut j,l j t i,k )) t j,l j ti,k )+1 t i,k u j τ) dτ. 31) Consider now an agent j that updates its ontrol at least one before time t, and fous on the term u j τ) with τ [t j,l j t i,k )+1,t). Sine 9) holds for all the agents until time t, we an write u j τ) z j τ) + ũ j τ) zτ) + στ)). 32) Morevoer, in τ [t j,l j t i,k )+1,t), sine 9) holds, the state of the system onverges to the region desribed by 17). Therefore, taking into aount that ωτ) B i,k τ) and στ) σt i,k ), we an write zτ) max zti,k ), λ σti,k) + B )} i,kτ). 33) λ 2 Also, sine t i,k τ, 9) holds for all the agents at time t i,k, and we an write zt i,k ) ut i,k ) + σt i,k ). 34) Using 33) and 34) into 32) we an write u j τ) R i, j,k τ) + στ) ), whih substituted into 31) yields ẑ i t i,k ) ẑ i t) S i,k t). ow sine 22) is applied, we have S i,k t) βt), and onsequently ẑi t i,k ) ẑ i t) βt). 35) ow substituting 27) and 35) into 24), we have σt) < α + βt) This is a ontradition, sine α and βt) are defined so that σt) = α + βt). We an onlude that 9) holds for all the agents i at all times t 0.

7 ow sine 9) holds for all the agents uniformly, Assumptions 1 to 3 hold, and Theorem 1 an be applied. Hene pratial onsensus is attained with radius 10). Remark 8: Sine Theorem 2 only requires that t i,k+1 T i, j,k for all j V and t i,k+1 T, the sheduling rule 22) may be relaxed to t i,k < t i,k+1 i,k min Ti, j,k,t i,k}. 36) j V i i} This gives eah agent a degree of freedom in the sheduling of the next onnetion to the loud. Suh degree of freedom may be exploited to avoid loud ongestion due to multiple ontemporary aesses. In fat, if 36) is enfored, agent i is free to hoose t i,k+1 in a given interval, and sine it is aware of the subsequent update times t j,l j t i,k )+1 of all the other agents j i, it an shedule t i,k+1 so that it does not oinide with any of these instants. Remark 9: An alternative upper bound to 34) is zti,k ) ẑti,k ) + α. Fig. 1. Trend of the first onsensus variable x 1) i = p 1) i b 1) i, for eah agent i = 1,...,5 during the simulation. Therefore, funtion R i, j,k t) an also be designed as uti,k ) R i, j,k t) := max min + σt i,k ), ẑti,k ) + α }, λ σt λ j,l 2 jti,k)+1) + B )} i,kt), In this ase, when sheduling the update time t i,k+1, agent i needs to ompute ẑti,k ). If the topology of the onnetions among the vehiles is known, ẑti,k ) an be omputed by using 19) with t = t i,k. VI. UMERICAL SIMULATIOS In order to orroborate the theoretial results, we applied the proposed ontrol algorithm to a formation problem on a simulated network made up of = 5 planar vehiles. The topology of the onnetions is desribed by a omplete graph, so that every agent reeives feedbak from every other agent. The desired formation is desribed by the offsets [ 25, 25), 25,25), 0,0), 25, 25), 25,25)]. The simulation takes plae the time span [0, 50]. The agents are spawned in initial positions randomly extrated in a square of 200 by 200. We pik a ontrol gain = 0.01 and a threshold funtion σt) = e 0.05t. A different value of the additive disturbane is hosen for eah agent, randomly extrated in the range 1.0, 1.0) on both oordinates. At eah hundredth of seond this value is hanged with probability , by randomly extrating a new value from the same range. To model the foreast that the agents reeive about suh disturbanes, at eah update of a vehile i we assign to γ i,k a value of r γ ), where r γ is randomly extrated in 0.0,1.0), while we assign value zero to ρ i,k. With these hoies we have that the norm of the disturbanes is always below the estimate that the agents reeive. Figure 1 illustrates the onvergene of the first position variable for eah vehile during the simulation. Fig. 2. Paths p i t) exeuted by eah vehile i = 1,...,5 during the simulation upper) and detail lower). Figure 2 shows the two-dimensional paths. Finally, Table II shows the update times t i,k in the time span [0,50] for eah agent i = 1,...,5. VII. COCLUSIOS A loud-based ontrol algorithm has been proposed for pratial onsensus of a network of agents with integrator

8 k t 1,k t 2,k t 3,k t 4,k t 5,k TABLE II UPDATE TIMES I THE TIME SPA [0,50]. dynamis under event-triggered updates and additive disturbanes. Suffiient onditions for onvergene have been identified in terms of the network topology and of the sheduling of the ontrol updates. The proposed approah ombines the benefits of event/self-triggered ontrol shemes with the advantage of having a shared asynhronous loud support. Speifially, eah agent shedules its own sequene of loud aesses in order to ahieve a oordinated network formation. The setup is partiularly onvenient for those appliations where diret ommuniation among agents is not always feasible, suh as formation ontrol for AUVs. For this problem, the ontrol algorithm overomes the limitation of having a pre-assigned trajetory for the whole fleet as well as the synhronization of the surfaing of all the agents [20], [23]. Future work will further develop the approah of the paper onsidering different sheduling laws for the loud aesses as well as other ontrol objetives, e.g. leader follower ontrol. Furthermore, more omplex agent dynamis and more omplex models for the foreast on the disturbanes will be studied. REFERECES [1] R. Olfati-Saber, J. A. Fax, and R. M. Murray. Consensus and ooperation in networked multi-agent systems. Proeedings of the IEEE, 951): , [2] W. Ren, R. W. Beard, and E. M. Atkins. A survey of onsensus problems in multi-agent oordination. In Amerian Control Conferene, Portland, Oregon, USA, [3] M. Arak. Passivity as a design tool for group oordination. IEEE Transations on Automati Control, 528): , [4] Dimos V. Dimarogonas and Kostas J. Kyriakopoulos. A onnetion between formation infeasibility and veloity alignment in kinemati multi-agent systems. Automatia, 4410): , [5] D. esi and A. R. Teel. Input-output stability properties of networked ontrol systems. IEEE Transation on Automati Control, 4910): , [6] M. Mazo and P. Tabuada. Deentralized event-triggered ontrol over wireless sensor/atuator networks. IEEE Trasations on Automati Control, 5610): , Ot [7] P. Tabuada. Event-triggered real-time sheduling of stabilizing ontrol tasks. IEEE Transation on Automati Control, 529): , [8] A. Anta and P. Tabuada. To sample or not to sample: self-triggered ontrol for nonlinear systems. IEEE Transations on Automati Control, 55: , [9] X. Wang and M. D. Lemmon. Self-triggered feedbak ontrol systems with finite-gain L2 stability. IEEE Transations on Automati Control, 54: , [10] O. Demir and J. Lunze. Event-based synhronisation of multi-agent systems. In Proeedings of the 4th IFAC Conferene on Analysis and Design of Hybrid Systems, [11] D. Liuzza, D. V. Dimarogonas, M. di Bernardo, and K. H. Johansson. Distributed model-based event-triggered ontrol for synhronization of multi-agent systems. In IFAC Conferene on onlinear Control Systems OLCOS), Toulouse, Frane, [12] C. De Persis and P. Frasa. Self-triggered oordination with ternary ontrollers. In IFAC Workshop on Distributed Estimation and Control in etworked Systems esys), [13] P. T. Eugster, P. A. Felber, R. Guerraoui, and Kermarre A. M. The many faes of publish/subsribe. ACM Computing Surveys, 35: , [14] G. Cugola and H. A. Jaobsen. Using publish/subsribe middleware for mobile systems. ACM SIGMOBILE Mobile Computing and Communiations Review, 6:25 33, [15] M. Ansbjerg Kjer, M. Kihl, and A. Robertsson. Resoure alloation and disturbane rejetion in web servers using SLAs and virtualized servers. IEEE Transations on etwork Servie Management, 6: , [16] H. C. Lim, S. Babu, J. S. Chase, and S. S. Parekh. Automated ontrol in loud omputing: hallenges and opportunities. In Workshop on Automated ontrol for dataenters and louds, ACDC, Barelona, Spain, [17] S. Samii, P. Eles, Z. Peng, Tabuada P., and A. Cervin. Dynami sheduling and ontrol-quality optimization of self-triggered ontrol appliations. In IEEE Real-Time Systems Symposium, San Diego, California, US, [18] Y. Xu, K.-E. Årzén, Bini E., and A. Cervin. Response time driven design of ontrol systems. In The 19th World Congress of the International Federation of Automati Control, [19]. A. Cruz, B. M. Ferreira, Kebkal O., A. C. Matos, C. Petrioli, R. Petroia, and D. Spaini. Investigation of underwater aousti networking enabling the ooperative operation of multiple heterogeneous vehiles. Marine Tehnology Soiety Journal, 47:43 58, [20] E. Fiorelli,. E. Leonard, P. Bhatta, D. A. Paley, R. Bahmayer, and D. M. Fratantoni. Multi-AUV ontrol and adaptive sampling in Monterey bay. IEEE Journal of Oeani Engineering, 31: , [21] W. Yan, R. Cui, and D. Xu. Formation ontrol of underatuated autonomous underwater vehiles in horizontal plane. In IEEE International Conferene on Automation and Logistis, Qingdao, China, [22] P. V. Teixeira, D. V. Dimarogonas, K. H. Johansson, and J. Sousa. Event-based motion oordination of multiple underwater vehiles under disturbanes. In OCEAS 10 IEEE, Sidney, Australia, [23] P. V. Teixeira, D. V. Dimarogonas, K. H. Johansson, and J. Sousa. Multi-agent oordination with event-based ommuniation. In Amerian Control Conferene, Baltimore, Maryland, US, [24] R. A. Horn and C. R. Johnson. Topis in Matrix Analysis. Cambridge University Press, 1991.

A Holistic Method for Selecting Web Services in Design of Composite Applications

A Holistic Method for Selecting Web Services in Design of Composite Applications A Holisti Method for Seleting Web Servies in Design of Composite Appliations Mārtiņš Bonders, Jānis Grabis Institute of Information Tehnology, Riga Tehnial University, 1 Kalu Street, Riga, LV 1658, Latvia,

More information

Channel Assignment Strategies for Cellular Phone Systems

Channel Assignment Strategies for Cellular Phone Systems Channel Assignment Strategies for Cellular Phone Systems Wei Liu Yiping Han Hang Yu Zhejiang University Hangzhou, P. R. China Contat: wliu5@ie.uhk.edu.hk 000 Mathematial Contest in Modeling (MCM) Meritorious

More information

) ( )( ) ( ) ( )( ) ( ) ( ) (1)

) ( )( ) ( ) ( )( ) ( ) ( ) (1) OPEN CHANNEL FLOW Open hannel flow is haraterized by a surfae in ontat with a gas phase, allowing the fluid to take on shapes and undergo behavior that is impossible in a pipe or other filled onduit. Examples

More information

Hierarchical Clustering and Sampling Techniques for Network Monitoring

Hierarchical Clustering and Sampling Techniques for Network Monitoring S. Sindhuja Hierarhial Clustering and Sampling Tehniques for etwork Monitoring S. Sindhuja ME ABSTRACT: etwork monitoring appliations are used to monitor network traffi flows. Clustering tehniques are

More information

Chapter 1 Microeconomics of Consumer Theory

Chapter 1 Microeconomics of Consumer Theory Chapter 1 Miroeonomis of Consumer Theory The two broad ategories of deision-makers in an eonomy are onsumers and firms. Eah individual in eah of these groups makes its deisions in order to ahieve some

More information

Static Fairness Criteria in Telecommunications

Static Fairness Criteria in Telecommunications Teknillinen Korkeakoulu ERIKOISTYÖ Teknillisen fysiikan koulutusohjelma 92002 Mat-208 Sovelletun matematiikan erikoistyöt Stati Fairness Criteria in Teleommuniations Vesa Timonen, e-mail: vesatimonen@hutfi

More information

Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks

Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks Performane Analysis of IEEE 80.11 in Multi-hop Wireless Networks Lan Tien Nguyen 1, Razvan Beuran,1, Yoihi Shinoda 1, 1 Japan Advaned Institute of Siene and Tehnology, 1-1 Asahidai, Nomi, Ishikawa, 93-19

More information

MATE: MPLS Adaptive Traffic Engineering

MATE: MPLS Adaptive Traffic Engineering MATE: MPLS Adaptive Traffi Engineering Anwar Elwalid Cheng Jin Steven Low Indra Widjaja Bell Labs EECS Dept EE Dept Fujitsu Network Communiations Luent Tehnologies Univ. of Mihigan Calteh Pearl River,

More information

Supply chain coordination; A Game Theory approach

Supply chain coordination; A Game Theory approach aepted for publiation in the journal "Engineering Appliations of Artifiial Intelligene" 2008 upply hain oordination; A Game Theory approah Jean-Claude Hennet x and Yasemin Arda xx x LI CNR-UMR 668 Université

More information

Computer Networks Framing

Computer Networks Framing Computer Networks Framing Saad Mneimneh Computer Siene Hunter College of CUNY New York Introdution Who framed Roger rabbit? A detetive, a woman, and a rabbit in a network of trouble We will skip the physial

More information

5.2 The Master Theorem

5.2 The Master Theorem 170 CHAPTER 5. RECURSION AND RECURRENCES 5.2 The Master Theorem Master Theorem In the last setion, we saw three different kinds of behavior for reurrenes of the form at (n/2) + n These behaviors depended

More information

Optimal Online Buffer Scheduling for Block Devices *

Optimal Online Buffer Scheduling for Block Devices * Optimal Online Buffer Sheduling for Blok Devies * ABSTRACT Anna Adamaszek Department of Computer Siene and Centre for Disrete Mathematis and its Appliations (DIMAP) University of Warwik, Coventry, UK A.M.Adamaszek@warwik.a.uk

More information

Chapter 6 A N ovel Solution Of Linear Congruenes Proeedings NCUR IX. (1995), Vol. II, pp. 708{712 Jerey F. Gold Department of Mathematis, Department of Physis University of Utah Salt Lake City, Utah 84112

More information

FIRE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero

FIRE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero FE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero Robotis, Computer Vision and Intelligent Control Group. University

More information

A novel active mass damper for vibration control of bridges

A novel active mass damper for vibration control of bridges IABMAS 08, International Conferene on Bridge Maintenane, Safety and Management, 3-7 July 008, Seoul, Korea A novel ative mass damper for vibration ontrol of bridges U. Starossek & J. Sheller Strutural

More information

Sebastián Bravo López

Sebastián Bravo López Transfinite Turing mahines Sebastián Bravo López 1 Introdution With the rise of omputers with high omputational power the idea of developing more powerful models of omputation has appeared. Suppose that

More information

An Enhanced Critical Path Method for Multiple Resource Constraints

An Enhanced Critical Path Method for Multiple Resource Constraints An Enhaned Critial Path Method for Multiple Resoure Constraints Chang-Pin Lin, Hung-Lin Tai, and Shih-Yan Hu Abstrat Traditional Critial Path Method onsiders only logial dependenies between related ativities

More information

Optimal Sales Force Compensation

Optimal Sales Force Compensation Optimal Sales Fore Compensation Matthias Kräkel Anja Shöttner Abstrat We analyze a dynami moral-hazard model to derive optimal sales fore ompensation plans without imposing any ad ho restritions on the

More information

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 401

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 401 IEEE TRASACTIOS O DEPEDABLE AD SECURE COMPUTIG, VOL. 9, O. 3, MAY/JUE 2012 401 Mitigating Distributed Denial of Servie Attaks in Multiparty Appliations in the Presene of Clok Drifts Zhang Fu, Marina Papatriantafilou,

More information

Neural network-based Load Balancing and Reactive Power Control by Static VAR Compensator

Neural network-based Load Balancing and Reactive Power Control by Static VAR Compensator nternational Journal of Computer and Eletrial Engineering, Vol. 1, No. 1, April 2009 Neural network-based Load Balaning and Reative Power Control by Stati VAR Compensator smail K. Said and Marouf Pirouti

More information

A Robust Optimization Approach to Dynamic Pricing and Inventory Control with no Backorders

A Robust Optimization Approach to Dynamic Pricing and Inventory Control with no Backorders A Robust Optimization Approah to Dynami Priing and Inventory Control with no Bakorders Elodie Adida and Georgia Perakis July 24 revised July 25 Abstrat In this paper, we present a robust optimization formulation

More information

Henley Business School at Univ of Reading. Pre-Experience Postgraduate Programmes Chartered Institute of Personnel and Development (CIPD)

Henley Business School at Univ of Reading. Pre-Experience Postgraduate Programmes Chartered Institute of Personnel and Development (CIPD) MS in International Human Resoure Management For students entering in 2012/3 Awarding Institution: Teahing Institution: Relevant QAA subjet Benhmarking group(s): Faulty: Programme length: Date of speifiation:

More information

THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES

THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES Proeedings of FEDSM 98 998 ASME Fluids Engineering Division Summer Meeting June 2-25, 998 Washington DC FEDSM98-529 THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES John D. Wright Proess

More information

Capacity at Unsignalized Two-Stage Priority Intersections

Capacity at Unsignalized Two-Stage Priority Intersections Capaity at Unsignalized Two-Stage Priority Intersetions by Werner Brilon and Ning Wu Abstrat The subjet of this paper is the apaity of minor-street traffi movements aross major divided four-lane roadways

More information

AUDITING COST OVERRUN CLAIMS *

AUDITING COST OVERRUN CLAIMS * AUDITING COST OVERRUN CLAIMS * David Pérez-Castrillo # University of Copenhagen & Universitat Autònoma de Barelona Niolas Riedinger ENSAE, Paris Abstrat: We onsider a ost-reimbursement or a ost-sharing

More information

State of Maryland Participation Agreement for Pre-Tax and Roth Retirement Savings Accounts

State of Maryland Participation Agreement for Pre-Tax and Roth Retirement Savings Accounts State of Maryland Partiipation Agreement for Pre-Tax and Roth Retirement Savings Aounts DC-4531 (08/2015) For help, please all 1-800-966-6355 www.marylandd.om 1 Things to Remember Complete all of the setions

More information

A Keyword Filters Method for Spam via Maximum Independent Sets

A Keyword Filters Method for Spam via Maximum Independent Sets Vol. 7, No. 3, May, 213 A Keyword Filters Method for Spam via Maximum Independent Sets HaiLong Wang 1, FanJun Meng 1, HaiPeng Jia 2, JinHong Cheng 3 and Jiong Xie 3 1 Inner Mongolia Normal University 2

More information

A Reputation Management Approach for Resource Constrained Trustee Agents

A Reputation Management Approach for Resource Constrained Trustee Agents A Reputation Management Approah for Resoure Constrained rustee Agents Han Yu, Chunyan Miao, Bo An 2, Cyril Leung 3, and Vitor R. Lesser 4 Nanyang ehnologial University, Singapore 2 he Key Lab of Intelligent

More information

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules Improved Vehile Classifiation in Long Traffi Video by Cooperating Traker and Classifier Modules Brendan Morris and Mohan Trivedi University of California, San Diego San Diego, CA 92093 {b1morris, trivedi}@usd.edu

More information

An integrated optimization model of a Closed- Loop Supply Chain under uncertainty

An integrated optimization model of a Closed- Loop Supply Chain under uncertainty ISSN 1816-6075 (Print), 1818-0523 (Online) Journal of System and Management Sienes Vol. 2 (2012) No. 3, pp. 9-17 An integrated optimization model of a Closed- Loop Supply Chain under unertainty Xiaoxia

More information

Deadline-based Escalation in Process-Aware Information Systems

Deadline-based Escalation in Process-Aware Information Systems Deadline-based Esalation in Proess-Aware Information Systems Wil M.P. van der Aalst 1,2, Mihael Rosemann 2, Marlon Dumas 2 1 Department of Tehnology Management Eindhoven University of Tehnology, The Netherlands

More information

Green Cloud Computing

Green Cloud Computing International Journal of Information and Computation Tehnology. ISSN 0974-2239 Volume 4, Number 4 (2014), pp. 431-436 International Researh Publiations House http://www. irphouse.om /ijit.htm Green Cloud

More information

SLA-based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments

SLA-based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments 2 th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing SLA-based Resoure Alloation for Software as a Servie Provider (SaaS) in Cloud Computing Environments Linlin Wu, Saurabh Kumar

More information

Asymmetric Error Correction and Flash-Memory Rewriting using Polar Codes

Asymmetric Error Correction and Flash-Memory Rewriting using Polar Codes 1 Asymmetri Error Corretion and Flash-Memory Rewriting using Polar Codes Eyal En Gad, Yue Li, Joerg Kliewer, Mihael Langberg, Anxiao (Andrew) Jiang and Jehoshua Bruk Abstrat We propose effiient oding shemes

More information

A Context-Aware Preference Database System

A Context-Aware Preference Database System J. PERVASIVE COMPUT. & COMM. (), MARCH 005. TROUBADOR PUBLISHING LTD) A Context-Aware Preferene Database System Kostas Stefanidis Department of Computer Siene, University of Ioannina,, kstef@s.uoi.gr Evaggelia

More information

Open and Extensible Business Process Simulator

Open and Extensible Business Process Simulator UNIVERSITY OF TARTU FACULTY OF MATHEMATICS AND COMPUTER SCIENCE Institute of Computer Siene Karl Blum Open and Extensible Business Proess Simulator Master Thesis (30 EAP) Supervisors: Luiano Garía-Bañuelos,

More information

Bandwidth Allocation and Session Scheduling using SIP

Bandwidth Allocation and Session Scheduling using SIP JOURAL OF COUICAIS, VOL., O. 5, AUGUS 006 7 Bandwidth Alloation and Session Sheduling using SIP Hassan HASSA, Jean-arie GARCIA and Olivier BRU LAAS-CRS, oulouse, Frane Email: {hhassan}@laas.fr Abstrat

More information

Improved SOM-Based High-Dimensional Data Visualization Algorithm

Improved SOM-Based High-Dimensional Data Visualization Algorithm Computer and Information Siene; Vol. 5, No. 4; 2012 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Siene and Eduation Improved SOM-Based High-Dimensional Data Visualization Algorithm Wang

More information

A Game Theoretical Approach to Gateway Selections in Multi-domain Wireless Networks

A Game Theoretical Approach to Gateway Selections in Multi-domain Wireless Networks 1 A Game Theoretial Approah to Gateway Seletions in Multi-domain Wireless Networks Yang Song, Starsky H.Y. Wong and Kang-Won Lee IBM Researh, Hawthorne, NY Email: {yangsong, hwong, kangwon}@us.ibm.om Abstrat

More information

Learning Curves and Stochastic Models for Pricing and Provisioning Cloud Computing Services

Learning Curves and Stochastic Models for Pricing and Provisioning Cloud Computing Services T Learning Curves and Stohasti Models for Priing and Provisioning Cloud Computing Servies Amit Gera, Cathy H. Xia Dept. of Integrated Systems Engineering Ohio State University, Columbus, OH 4310 {gera.,

More information

Weighting Methods in Survey Sampling

Weighting Methods in Survey Sampling Setion on Survey Researh Methods JSM 01 Weighting Methods in Survey Sampling Chiao-hih Chang Ferry Butar Butar Abstrat It is said that a well-designed survey an best prevent nonresponse. However, no matter

More information

Dataflow Features in Computer Networks

Dataflow Features in Computer Networks Magyar Kutatók 1. Nemzetközi Szimpóziuma 1 th International Symposium of Hungarian Researhers on Computational Intelligene and Informatis Gyula Max Budapest University of Tehnology and Eonomis, Department

More information

To Coordinate Or Not To Coordinate? Wide-Area Traffic Management for Data Centers

To Coordinate Or Not To Coordinate? Wide-Area Traffic Management for Data Centers To Coordinate Or Not To Coordinate? Wide-Area Traffi Management for Data Centers Srinivas Narayana, Joe Wenjie Jiang, Jennifer Rexford, Mung Chiang Department of Computer Siene, and Department of Eletrial

More information

Intelligent Measurement Processes in 3D Optical Metrology: Producing More Accurate Point Clouds

Intelligent Measurement Processes in 3D Optical Metrology: Producing More Accurate Point Clouds Intelligent Measurement Proesses in 3D Optial Metrology: Produing More Aurate Point Clouds Charles Mony, Ph.D. 1 President Creaform in. mony@reaform3d.om Daniel Brown, Eng. 1 Produt Manager Creaform in.

More information

Measurement of Powder Flow Properties that relate to Gravity Flow Behaviour through Industrial Processing Lines

Measurement of Powder Flow Properties that relate to Gravity Flow Behaviour through Industrial Processing Lines Measurement of Powder Flow Properties that relate to Gravity Flow ehaviour through Industrial Proessing Lines A typial industrial powder proessing line will inlude several storage vessels (e.g. bins, bunkers,

More information

Granular Problem Solving and Software Engineering

Granular Problem Solving and Software Engineering Granular Problem Solving and Software Engineering Haibin Zhu, Senior Member, IEEE Department of Computer Siene and Mathematis, Nipissing University, 100 College Drive, North Bay, Ontario, P1B 8L7, Canada

More information

WORKFLOW CONTROL-FLOW PATTERNS A Revised View

WORKFLOW CONTROL-FLOW PATTERNS A Revised View WORKFLOW CONTROL-FLOW PATTERNS A Revised View Nik Russell 1, Arthur H.M. ter Hofstede 1, 1 BPM Group, Queensland University of Tehnology GPO Box 2434, Brisbane QLD 4001, Australia {n.russell,a.terhofstede}@qut.edu.au

More information

Online Energy Generation Scheduling for Microgrids with Intermittent Energy Sources and Co-Generation

Online Energy Generation Scheduling for Microgrids with Intermittent Energy Sources and Co-Generation Online Energy Generation Sheduling for Mirogrids with Intermittent Energy Soures and Co-Generation Lian Lu Information Engineering Dept. he Chinese Univ. of Hong Kong Jinlong u Information Engineering

More information

Trade Information, Not Spectrum: A Novel TV White Space Information Market Model

Trade Information, Not Spectrum: A Novel TV White Space Information Market Model Trade Information, Not Spetrum: A Novel TV White Spae Information Market Model Yuan Luo, Lin Gao, and Jianwei Huang 1 Abstrat In this paper, we propose a novel information market for TV white spae networks,

More information

Effects of Inter-Coaching Spacing on Aerodynamic Noise Generation Inside High-speed Trains

Effects of Inter-Coaching Spacing on Aerodynamic Noise Generation Inside High-speed Trains Effets of Inter-Coahing Spaing on Aerodynami Noise Generation Inside High-speed Trains 1 J. Ryu, 1 J. Park*, 2 C. Choi, 1 S. Song Hanyang University, Seoul, South Korea 1 ; Korea Railroad Researh Institute,

More information

10.1 The Lorentz force law

10.1 The Lorentz force law Sott Hughes 10 Marh 2005 Massahusetts Institute of Tehnology Department of Physis 8.022 Spring 2004 Leture 10: Magneti fore; Magneti fields; Ampere s law 10.1 The Lorentz fore law Until now, we have been

More information

TECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS

TECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS TECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS ICSRiM - University of Leeds Shool of Computing & Shool of Musi Leeds LS2 9JT, UK +44-113-343-2583 kia@i-maestro.org www.i-maestro.org,

More information

Impedance Method for Leak Detection in Zigzag Pipelines

Impedance Method for Leak Detection in Zigzag Pipelines 10.478/v10048-010-0036-0 MEASUREMENT SCIENCE REVIEW, Volume 10, No. 6, 010 Impedane Method for Leak Detetion in igzag Pipelines A. Lay-Ekuakille 1, P. Vergallo 1, A. Trotta 1 Dipartimento d Ingegneria

More information

Downlink Scheduling and Radio Resource Allocation in Adaptive OFDMA Wireless Communication Systems for User-Individual QoS

Downlink Scheduling and Radio Resource Allocation in Adaptive OFDMA Wireless Communication Systems for User-Individual QoS Downlin Sheduling and Radio Resoure Alloation in Adaptive OFDMA Wireless Communiation Systems for User-Individual QoS Lu Yanhui, Wang Chunming, Yin Changhuan, and Yue Guangxin Abstrat In this paper, we

More information

Henley Business School at Univ of Reading. Chartered Institute of Personnel and Development (CIPD)

Henley Business School at Univ of Reading. Chartered Institute of Personnel and Development (CIPD) MS in International Human Resoure Management (full-time) For students entering in 2015/6 Awarding Institution: Teahing Institution: Relevant QAA subjet Benhmarking group(s): Faulty: Programme length: Date

More information

The Optimal Deterrence of Tax Evasion: The Trade-off Between Information Reporting and Audits

The Optimal Deterrence of Tax Evasion: The Trade-off Between Information Reporting and Audits The Optimal Deterrene of Tax Evasion: The Trade-off Between Information Reporting and Audits Yulia Paramonova Department of Eonomis, University of Mihigan Otober 30, 2014 Abstrat Despite the widespread

More information

Impact Simulation of Extreme Wind Generated Missiles on Radioactive Waste Storage Facilities

Impact Simulation of Extreme Wind Generated Missiles on Radioactive Waste Storage Facilities Impat Simulation of Extreme Wind Generated issiles on Radioative Waste Storage Failities G. Barbella Sogin S.p.A. Via Torino 6 00184 Rome (Italy), barbella@sogin.it Abstrat: The strutural design of temporary

More information

cos t sin t sin t cos t

cos t sin t sin t cos t Exerise 7 Suppose that t 0 0andthat os t sin t At sin t os t Compute Bt t As ds,andshowthata and B ommute 0 Exerise 8 Suppose A is the oeffiient matrix of the ompanion equation Y AY assoiated with the

More information

Marker Tracking and HMD Calibration for a Video-based Augmented Reality Conferencing System

Marker Tracking and HMD Calibration for a Video-based Augmented Reality Conferencing System Marker Traking and HMD Calibration for a Video-based Augmented Reality Conferening System Hirokazu Kato 1 and Mark Billinghurst 2 1 Faulty of Information Sienes, Hiroshima City University 2 Human Interfae

More information

Agent-Based Grid Load Balancing Using Performance-Driven Task Scheduling

Agent-Based Grid Load Balancing Using Performance-Driven Task Scheduling Agent-Based Grid Load Balaning Using Performane-Driven Task Sheduling Junwei Cao *1, Daniel P. Spooner, Stephen A. Jarvis, Subhash Saini and Graham R. Nudd * C&C Researh Laboratories, NEC Europe Ltd.,

More information

Recovering Articulated Motion with a Hierarchical Factorization Method

Recovering Articulated Motion with a Hierarchical Factorization Method Reovering Artiulated Motion with a Hierarhial Fatorization Method Hanning Zhou and Thomas S Huang University of Illinois at Urbana-Champaign, 405 North Mathews Avenue, Urbana, IL 680, USA {hzhou, huang}@ifpuiuedu

More information

HEAT CONDUCTION. q A q T

HEAT CONDUCTION. q A q T HEAT CONDUCTION When a temperature gradient eist in a material, heat flows from the high temperature region to the low temperature region. The heat transfer mehanism is referred to as ondution and the

More information

The Application of Mamdani Fuzzy Model for Auto Zoom Function of a Digital Camera

The Application of Mamdani Fuzzy Model for Auto Zoom Function of a Digital Camera (IJCSIS) International Journal of Computer Siene and Information Seurity, Vol. 6, No. 3, 2009 The Appliation of Mamdani Fuzzy Model for Auto Funtion of a Digital Camera * I. Elamvazuthi, P. Vasant Universiti

More information

Computational Analysis of Two Arrangements of a Central Ground-Source Heat Pump System for Residential Buildings

Computational Analysis of Two Arrangements of a Central Ground-Source Heat Pump System for Residential Buildings Computational Analysis of Two Arrangements of a Central Ground-Soure Heat Pump System for Residential Buildings Abstrat Ehab Foda, Ala Hasan, Kai Sirén Helsinki University of Tehnology, HVAC Tehnology,

More information

To the Graduate Council:

To the Graduate Council: o the Graduate Counil: I am submitting herewith a dissertation written by Yan Xu entitled A Generalized Instantaneous Nonative Power heory for Parallel Nonative Power Compensation. I have examined the

More information

How To Fator

How To Fator CHAPTER hapter 4 > Make the Connetion 4 INTRODUCTION Developing seret odes is big business beause of the widespread use of omputers and the Internet. Corporations all over the world sell enryption systems

More information

User s Guide VISFIT: a computer tool for the measurement of intrinsic viscosities

User s Guide VISFIT: a computer tool for the measurement of intrinsic viscosities File:UserVisfit_2.do User s Guide VISFIT: a omputer tool for the measurement of intrinsi visosities Version 2.a, September 2003 From: Multiple Linear Least-Squares Fits with a Common Interept: Determination

More information

Professional Certificate Training in Business Writing

Professional Certificate Training in Business Writing Professional Certifiate Training in Business Writing About Training in Business Writing ZeebraCross Centre for Management Exellene (ZCME) is an initiative of ZeebraCross (Unit of InfousRx Marketing and

More information

Programming Basics - FORTRAN 77 http://www.physics.nau.edu/~bowman/phy520/f77tutor/tutorial_77.html

Programming Basics - FORTRAN 77 http://www.physics.nau.edu/~bowman/phy520/f77tutor/tutorial_77.html CWCS Workshop May 2005 Programming Basis - FORTRAN 77 http://www.physis.nau.edu/~bowman/phy520/f77tutor/tutorial_77.html Program Organization A FORTRAN program is just a sequene of lines of plain text.

More information

4.15 USING METEOSAT SECOND GENERATION HIGH RESOLUTION VISIBLE DATA FOR THE IMPOVEMENT OF THE RAPID DEVELOPPING THUNDERSTORM PRODUCT

4.15 USING METEOSAT SECOND GENERATION HIGH RESOLUTION VISIBLE DATA FOR THE IMPOVEMENT OF THE RAPID DEVELOPPING THUNDERSTORM PRODUCT 4.15 USNG METEOSAT SECOND GENEATON HGH ESOLUTON VSBLE DATA FO THE MPOVEMENT OF THE APD DEVELOPPNG THUNDESTOM PODUCT Oleksiy Kryvobok * Ukrainian HydroMeteorologial nstitute Kyiv, Ukraine Stephane Senesi

More information

Using Live Chat in your Call Centre

Using Live Chat in your Call Centre Using Live Chat in your Call Centre Otober Key Highlights Yesterday's all entres have beome today's ontat entres where agents deal with multiple queries from multiple hannels. Live Chat hat is one now

More information

In order to be able to design beams, we need both moments and shears. 1. Moment a) From direct design method or equivalent frame method

In order to be able to design beams, we need both moments and shears. 1. Moment a) From direct design method or equivalent frame method BEAM DESIGN In order to be able to design beams, we need both moments and shears. 1. Moment a) From diret design method or equivalent frame method b) From loads applied diretly to beams inluding beam weight

More information

Procurement auctions are sometimes plagued with a chosen supplier s failing to accomplish a project successfully.

Procurement auctions are sometimes plagued with a chosen supplier s failing to accomplish a project successfully. Deision Analysis Vol. 7, No. 1, Marh 2010, pp. 23 39 issn 1545-8490 eissn 1545-8504 10 0701 0023 informs doi 10.1287/dea.1090.0155 2010 INFORMS Managing Projet Failure Risk Through Contingent Contrats

More information

REDUCTION FACTOR OF FEEDING LINES THAT HAVE A CABLE AND AN OVERHEAD SECTION

REDUCTION FACTOR OF FEEDING LINES THAT HAVE A CABLE AND AN OVERHEAD SECTION C I E 17 th International Conferene on Eletriity istriution Barelona, 1-15 May 003 EUCTION FACTO OF FEEING LINES THAT HAVE A CABLE AN AN OVEHEA SECTION Ljuivoje opovi J.. Elektrodistriuija - Belgrade -

More information

Paid Placement Strategies for Internet Search Engines

Paid Placement Strategies for Internet Search Engines Paid Plaement Strategies for Internet Searh Engines Hemant K. Bhargava Smeal College of Business Penn State University 342 Beam Building University Park, PA 16802 bhargava@omputer.org Juan Feng Smeal College

More information

arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrence Berkeley National Laboratory One Cyclotron Road Berkeley, CA 94720 USA

arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrence Berkeley National Laboratory One Cyclotron Road Berkeley, CA 94720 USA LBNL-52402 Marh 2003 On the Speed of Gravity and the v/ Corretions to the Shapiro Time Delay Stuart Samuel 1 arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrene Berkeley National Laboratory

More information

A Comparison of Default and Reduced Bandwidth MR Imaging of the Spine at 1.5 T

A Comparison of Default and Reduced Bandwidth MR Imaging of the Spine at 1.5 T 9 A Comparison of efault and Redued Bandwidth MR Imaging of the Spine at 1.5 T L. Ketonen 1 S. Totterman 1 J. H. Simon 1 T. H. Foster 2. K. Kido 1 J. Szumowski 1 S. E. Joy1 The value of a redued bandwidth

More information

3 Game Theory: Basic Concepts

3 Game Theory: Basic Concepts 3 Game Theory: Basi Conepts Eah disipline of the soial sienes rules omfortably ithin its on hosen domain: : : so long as it stays largely oblivious of the others. Edard O. Wilson (1998):191 3.1 and and

More information

' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF

' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF ' R :::i:. ATIONAL :'.:::::: RETENTION ':: Compliane with the way you work, PRODUCT BRIEF In-plae Management of Unstrutured Data The explosion of unstrutured data ombined with new laws and regulations

More information

Chapter 5 Single Phase Systems

Chapter 5 Single Phase Systems Chapter 5 Single Phase Systems Chemial engineering alulations rely heavily on the availability of physial properties of materials. There are three ommon methods used to find these properties. These inlude

More information

On the Characteristics of Spectrum-Agile Communication Networks

On the Characteristics of Spectrum-Agile Communication Networks 1 On the Charateristis of Spetrum-Agile Communiation Networks Xin Liu Wei Wang Department of Computer Siene University of California, Davis, CA 95616 Email:{liu,wangw}@s.udavis.edu Abstrat Preliminary

More information

Robust Classification and Tracking of Vehicles in Traffic Video Streams

Robust Classification and Tracking of Vehicles in Traffic Video Streams Proeedings of the IEEE ITSC 2006 2006 IEEE Intelligent Transportation Systems Conferene Toronto, Canada, September 17-20, 2006 TC1.4 Robust Classifiation and Traking of Vehiles in Traffi Video Streams

More information

AUTOMATED VISUAL TRAFFIC MONITORING AND SURVEILLANCE THROUGH A NETWORK OF DISTRIBUTED UNITS

AUTOMATED VISUAL TRAFFIC MONITORING AND SURVEILLANCE THROUGH A NETWORK OF DISTRIBUTED UNITS AUTOMATED VISUAL TRAFFIC MOITORIG AD SURVEILLACE THROUGH A ETWORK OF DISTRIBUTED UITS A. Koutsia a, T. Semertzidis a, K. Dimitropoulos a,. Grammalidis a and K. Georgouleas b a Informatis and Telematis

More information

Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection

Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection Behavior Analysis-Based Learning Framework for Host Level Intrusion Detetion Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit Eletrial and Computer Engineering Department University of Arizona

More information

Customer Efficiency, Channel Usage and Firm Performance in Retail Banking

Customer Efficiency, Channel Usage and Firm Performance in Retail Banking Customer Effiieny, Channel Usage and Firm Performane in Retail Banking Mei Xue Operations and Strategi Management Department The Wallae E. Carroll Shool of Management Boston College 350 Fulton Hall, 140

More information

Parametric model of IP-networks in the form of colored Petri net

Parametric model of IP-networks in the form of colored Petri net Parametri model of IP-networks in the form of olored Petri net Shmeleva T.R. Abstrat A parametri model of IP-networks in the form of olored Petri net was developed; it onsists of a fixed number of Petri

More information

SUDOKU: Secure and Usable Deployment of Keys on Wireless Sensors

SUDOKU: Secure and Usable Deployment of Keys on Wireless Sensors SUDOKU: Seure and Usable Deployment of Keys on Wireless Sensors Matthias Wilhelm, Ivan Martinovi, Ersin Uzun, and Jens B. Shmitt diso Distributed Computer Systems Lab, TU Kaiserslautern, Germany {wilhelm,

More information

Agile ALM White Paper: Redefining ALM with Five Key Practices

Agile ALM White Paper: Redefining ALM with Five Key Practices Agile ALM White Paper: Redefining ALM with Five Key Praties by Ethan Teng, Cyndi Mithell and Chad Wathington 2011 ThoughtWorks ln. All rights reserved www.studios.thoughtworks.om Introdution The pervasiveness

More information

INVESTIGATION OF STABILITY ON NONLINEAR OSCILATIONS WITH ONE DEGREE OF FREEDOM

INVESTIGATION OF STABILITY ON NONLINEAR OSCILATIONS WITH ONE DEGREE OF FREEDOM 91 Kragujeva J. Math. 25 (2003) 91 96. INVESTIGATION OF STABILITY ON NONLINEAR OSCILATIONS WITH ONE DEGREE OF FREEDOM Julka Knežević-Miljanović 1 and Ljubia Lalović 2 1 Mathematis faulty of Belgrade, Serbia

More information

Algorithm of Removing Thin Cloud-fog Cover from Single Remote Sensing Image

Algorithm of Removing Thin Cloud-fog Cover from Single Remote Sensing Image Journal of Information & Computational Siene 11:3 (2014 817 824 February 10, 2014 Available at http://www.jois.om Algorithm of Removing Thin Cloud-fog Cover from Single Remote Sensing Image Yinqi Xiong,

More information

Scalable Hierarchical Multitask Learning Algorithms for Conversion Optimization in Display Advertising

Scalable Hierarchical Multitask Learning Algorithms for Conversion Optimization in Display Advertising Salable Hierarhial Multitask Learning Algorithms for Conversion Optimization in Display Advertising Amr Ahmed Google amra@google.om Abhimanyu Das Mirosoft Researh abhidas@mirosoft.om Alexander J. Smola

More information

AngelCast: Cloud-based Peer-Assisted Live Streaming Using Optimized Multi-Tree Construction

AngelCast: Cloud-based Peer-Assisted Live Streaming Using Optimized Multi-Tree Construction AngelCast: Cloud-based Peer-Assisted Live Streaming Using Optimized Multi-Tree Constrution Raymond Sweha Boston University remos@s.bu.edu Vathe Ishakian Boston University visahak@s.bu.edu Azer Bestavros

More information

Pattern Recognition Techniques in Microarray Data Analysis

Pattern Recognition Techniques in Microarray Data Analysis Pattern Reognition Tehniques in Miroarray Data Analysis Miao Li, Biao Wang, Zohreh Momeni, and Faramarz Valafar Department of Computer Siene San Diego State University San Diego, California, USA faramarz@sienes.sdsu.edu

More information

Electrician'sMathand BasicElectricalFormulas

Electrician'sMathand BasicElectricalFormulas Eletriian'sMathand BasiEletrialFormulas MikeHoltEnterprises,In. 1.888.NEC.CODE www.mikeholt.om Introdution Introdution This PDF is a free resoure from Mike Holt Enterprises, In. It s Unit 1 from the Eletrial

More information

Software Ecosystems: From Software Product Management to Software Platform Management

Software Ecosystems: From Software Product Management to Software Platform Management Software Eosystems: From Software Produt Management to Software Platform Management Slinger Jansen, Stef Peeters, and Sjaak Brinkkemper Department of Information and Computing Sienes Utreht University,

More information

10 UNSTEADY FLOW IN OPEN CHANNELS

10 UNSTEADY FLOW IN OPEN CHANNELS 0 UNTEY FLOW IN OEN CHNNEL 0. Introdution Unsteady flow in open hannels differs from that in losed onduits in that the eistene of a free surfae allows the flow ross-setion to freely hange, a fator whih

More information

Scalable TCP: Improving Performance in Highspeed Wide Area Networks

Scalable TCP: Improving Performance in Highspeed Wide Area Networks Salable TP: Improving Performane in Highspeed Wide Area Networks Tom Kelly ERN - IT Division Geneva 3 Switzerland tk@am.a.uk ABSTRAT TP ongestion ontrol an perform badly in highspeed wide area networks

More information

Prices and Heterogeneous Search Costs

Prices and Heterogeneous Search Costs Pries and Heterogeneous Searh Costs José L. Moraga-González Zsolt Sándor Matthijs R. Wildenbeest First draft: July 2014 Revised: June 2015 Abstrat We study prie formation in a model of onsumer searh for

More information

OpenScape 4000 CSTA V7 Connectivity Adapter - CSTA III, Part 2, Version 4.1. Developer s Guide A31003-G9310-I200-1-76D1

OpenScape 4000 CSTA V7 Connectivity Adapter - CSTA III, Part 2, Version 4.1. Developer s Guide A31003-G9310-I200-1-76D1 OpenSape 4000 CSTA V7 Connetivity Adapter - CSTA III, Part 2, Version 4.1 Developer s Guide A31003-G9310-I200-1-76 Our Quality and Environmental Management Systems are implemented aording to the requirements

More information

Interpretable Fuzzy Modeling using Multi-Objective Immune- Inspired Optimization Algorithms

Interpretable Fuzzy Modeling using Multi-Objective Immune- Inspired Optimization Algorithms Interpretable Fuzzy Modeling using Multi-Objetive Immune- Inspired Optimization Algorithms Jun Chen, Mahdi Mahfouf Abstrat In this paper, an immune inspired multi-objetive fuzzy modeling (IMOFM) mehanism

More information