Event-Triggered Control and Communication for Single-Master Multislave Teleoperation Systems With Try-Once-Discard Protocol

  • Yuling Li
  • , Chenxi Li
  • , Kun Liu*
  • , Jie Dong
  • , Rolf Johansson
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

Single-master multislave (SMMS) teleoperation systems can perform multiple tasks remotely in a shorter time, cover large-scale areas, and adapt more easily to single-point failures, thereby effectively encompassing a broader range of applications. As the number of slave manipulators sharing a communication network increases, the limitation of communication bandwidth becomes critical. To alleviate bandwidth usage, the try-once-discard (TOD) scheduling protocol and event-triggered mechanisms are often employed separately. In this article, we combine both strategies to optimize network bandwidth and energy consumption for SMMS teleoperation systems. Specifically, we propose event-triggered control and communication schemes for a class of SMMS teleoperation systems using the TOD scheduling protocol. Considering dynamic uncertainties, the unavailability of relative velocities, and time-varying delays, we develop adaptive controllers with virtual observers based on event-triggered schemes to achieve master-slave synchronization. Stability criteria for the SMMS teleoperation systems under these event-triggered control and communication schemes are established, demonstrating that Zeno behavior is excluded. Finally, experiments are conducted to validate the effectiveness of the proposed algorithms.

Original languageEnglish
JournalIEEE Transactions on Cybernetics
DOIs
Publication statusAccepted/In press - 2025
Externally publishedYes

Keywords

  • Event-triggered communication
  • event-triggered control
  • scheduling protocol
  • teleoperation systems

Fingerprint

Dive into the research topics of 'Event-Triggered Control and Communication for Single-Master Multislave Teleoperation Systems With Try-Once-Discard Protocol'. Together they form a unique fingerprint.

Cite this