Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Next Article in Journal
Predicting Pump Inspection Cycles for Oil Wells Based on Stacking Ensemble Models
Previous Article in Journal
Binary Encoding-Based Federated Learning for Traffic Sign Recognition in Autonomous Driving
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Design of Adaptive Finite-Time Backstepping Control for Shield Tunneling Systems with Constraints

1
State Key Laboratory of Shield Machine and Boring Technology, Zhengzhou 450001, China
2
School of Mathematics and Statistics, Zhengzhou University, Zhengzhou 450001, China
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Mathematics 2024, 12(14), 2230; https://doi.org/10.3390/math12142230
Submission received: 23 June 2024 / Revised: 7 July 2024 / Accepted: 15 July 2024 / Published: 17 July 2024
(This article belongs to the Special Issue Mathematical Method and Application of Machine Learning, 2nd Edition)

Abstract

:
This paper focuses on the finite-time tracking control problem of shield tunneling systems in the presence of constraints on the states and control input. By modeling the system based on the LuGre friction model, an effective method of tracking control in finite time is designed to overcome these actual constraints at the same time. First, the constraint on the system state is transformed into a symmetric constraint on the tracking error, and the constraint on control input is handled by designing an auxiliary differential equation. Then, radial basis function (RBF) neural networks are introduced to approximate the uncertainties. Next, using an adaptive finite-time backstepping method and choosing a logarithmic barrier Lyapunov function (BLF), a finite-time controller is designed to realize the finite-time stability of the closed-loop system. Finally, a simulation example is given to verify the correctness and validity of the theoretical results.

1. Introduction

A shield tunneling machine is a kind of construction machinery used for tunnel excavation, which has a complex structure and harsh working environment [1,2]. To reduce the risk of construction accidents caused by improper selection of tunneling parameters, it is necessary to use modern control technology to achieve more accurate control and provide useful guidance for operators.
Presently, many techniques are used in the construction of underground engineering [3,4,5,6]. During the tunneling process, the shield tunneling machine provides forward propulsive force through its thrust jacks (hydraulic cylinders), which will generate friction with the surrounding soil. Therefore, friction needs to be carefully considered in the force analysis. Presently, scholars have developed various models to study the friction force, and they have been widely applied [7,8,9,10]. The LuGre friction model proposed in [10] integrates the bristle deformation model and the Stribeck model, which can be used to establish the dynamic model of low-speed friction. For example, based on the LuGre friction model, refs. [11,12,13] investigated the non-uniform force friction compensation problem for the photoelectric tracking system, the friction compensation problem for a class of uncertain mechanical systems, and the adverse effect of nonlinear friction disturbance on tracking performance in permanent magnet synchronous motor servo systems, respectively. The propulsive velocity of the shield tunneling machine is relatively low during the tunneling process. LuGre friction model was adopted in [14,15] to describe the friction between the shield body and the surrounding soil during the tunneling process of the shield tunneling machine.
In practical engineering, the displacement, propulsive velocity, and propulsive force of the shield tunneling machine need to satisfy certain constraint conditions. For example, the tunneling machine could only advance forward, and the propulsive force should be positive and limited. These constraints were ignored in [14,15], which may affect construction safety and even lead to some unexpected situations. In the dynamic model of a shield tunneling machine based on the LuGre friction model, displacement and propulsive velocity are considered to be system states, while propulsive force is regarded as the actual control input. As such, these constraints are imposed on the system’s state and control inputs. By introducing new auxiliary variables to augment the system state, the control input constraint problem was converted into a state constraint problem in [16], therefore achieving consistent global finite-time stability. To convert the constrained output variable into an unconstrained output variable, an output transformation technique was presented in [17]. For a given output constraint or state constraint, the barrier Lyapunov function [18,19], the integral barrier Lyapunov function [20], the symmetric barrier Lyapunov function [21], or the asymmetric barrier Lyapunov function [22] were available to prevent the output or state from violating the constraints.
It should be noted that the shield tunneling machine could only advance forward, which determines that its displacement is non-negative and increasing monotonically. Meanwhile, the propulsive velocity and propulsive force are non-negative and finite. In the design of the control strategy, one needs to ensure that the full state and control input of the system always remain in a non-negative range. Moreover, as emphasized in [23,24], many tasks in practice are time-constrained and need to be accomplished within a finite time. Finite-time control ensures better convergence speed and accuracy for closed-loop control systems [25]. A class of uncertain all-state constrained strict feedback was investigated, and an adaptive finite-time command filtered backstepping control was designed in [26]. Using the finite-time Lyapunov stability theorem and saturated function, a control law to ensure both relative distance and circular velocity convergences to the prescribed values in a finite time was developed in [27], and the finite-time stability of networked control systems under denial-of-service attacks was considered in [28]. A group of heterogeneous autonomous underwater vehicle (AUV) systems with intermittent communication links was studied, and a finite-time trajectory-tracking control strategy was proposed in [29]. To investigate the problem of tracking control for a marine surface vehicle with output constraints, a finite-time control law with the virtue of backstepping technique was designed in [30]. An adaptive finite-time backstepping integral sliding mode control based on the inverse system method was presented for attitude tracking of the sail in [31]. The dynamic layout performance metrics were explored in [32], and both established and contemporary methods in trajectory planning, feedback, and feedforward control adaptive control were synthesized. The issue of trajectory tracking of helicopters under disturbances and input constraints was addressed in [33] via a fast finite-time backstepping framework.
In this paper, we investigate the finite-time tracking control problem of shield tunneling systems with constraints on the state and control input. First, the non-negative constraint on the state is transformed into a symmetric one, and the constraint on control input is handled by designing an auxiliary differential equation. Then, the finite-time convergence of the tracking error is realized by combining the barrier Lyapunov function (BLF) and the adaptive finite-time backstepping method. Meanwhile, radial basis function (RBF) neural networks are introduced to approximate some unknown functions. The simulation results show that the proposed adaptive finite-time backstepping control strategy for shield tunneling systems is effective.

2. Preliminaries and Problem Formulation

As shown in Figure 1, the shield tunneling machine cuts the soil through a rotating cutter head, while the pushing jacks (cylinders) provide forward thrust by pedaling on the built tunnel segments. The cut soil enters the soil bin and is then discharged through the screw conveyor. Whenever a shield tunneling machine excavates about 1.8 m, it stops digging and then installs tunnel segments. After the installation of the pipe segments is completed, the shield tunneling machine starts a new excavation process. To facilitate control and assembly of tunnel segments, it is necessary to group the thrust jacks of the shield tunneling machine into four groups in four directions: up, down, left, and right. For example, in Figure 2, group A consists of the cylinders labeled 15, 16, and 1, while group C consists of the ones labeled 6, 7, 8, 9, and 10. Each group of cylinders serves as a control unit.
Consider the dynamic model of a shield tunneling system based on the LuGre friction model [34]
x ˙ 1 = x 2 , x ˙ 2 = 1 M ( F u F J 1 ( x 2 ) z J 2 x 2 ) , z ˙ = x 2 σ 0 | x 2 | g ( x 2 ) z ,
where x 1 and x 2 represent the displacement and propulsive velocity of the shield head, respectively, forming the state vector x = [ x 1 , x 2 ] T of system (1); M is the mass of the shield head, and it is time-varying; F u denotes the total thrust of the cylinders, serving as the control input for system (1); function g ( x 2 ) R > 0 describes the Stribeck phenomenon, σ 0 is the stiffness; z is the internal friction state; F represents the earth pressure force exerted on cutter head and it is unknown and bounded; functions g ( x 2 ) , J 1 and J 2 are defined as follows
g ( x 2 ) = F c + ( F s F c ) e ( x 2 / v s ) 2 ,
J 1 = σ 0 σ 0 σ 1 | x 2 | g ( x 2 ) , J 2 = σ 1 + σ 2 ,
and the physical meanings of some symbols are briefly explained in Table 1.
In the field of motion control, the limitations of the actuator result in restricted control input for the shield tunneling system, making it difficult to achieve excessive control law values. In actual realization, the displacement and propulsive velocity are non-negative. To consider the complex motion form of the system, the following assumptions are needed
Assumption 1.
There exist positive scalars V max and P max such that the state x 1 , x 2 and the control input F u of system (1) satisfy 0 x 1 , 0 x 2 V max and 0 < F u P max , respectively.
Assumption 2.
The mass function M ( t ) and its derivative M ( t ) are bounded, i.e., there exist positive scalars M min , M max and M d such that 0 < M min M ( t ) M max , 0   | M ( t ) | M d .
Remark 1.
In practical engineering, the shield tunneling machine can only move forward and not backward. Its displacement is non-negative and monotonically increasing. Similarly, the propulsive velocity is non-negative. At the same time, due to the limitations of the physical properties of the actuator, the propulsive force can only be non-negative and has an upper bound. In addition, during the tunneling process of the shield machine, the cutter head cuts the soil, and the cut soil then enters the soil bin, which increases the mass of the shield head. At the same time, the shield machine uses screw conveyors and other devices to continuously discharge the soil from the bin and then reduce the mass of the shield head accordingly. Therefore, the mass of the shield head fluctuates within a limited range.

2.1. Problem Statement

Suppose that the shield tunneling system with full state constraints satisfies Assumptions 1 and 2, our goal is to design the control input F u such that the displacement x 1 and propulsive velocity x 2 of the shield tunneling system can track up to the desired signals x 1 d and x 2 d , where x 1 d , x 2 d are known and satisfy x ˙ 1 d = x 2 d .
Denote e 1 : = x 1 x 1 d as the tracking error, then it obtains e ˙ 1 = x ˙ 1 x ˙ 1 d = x 2 x ˙ 1 d . Let e 2 : = e ˙ 1 , then e ˙ 2 = x ˙ 2 x ¨ 1 d . Let u = F u P max / 2 , and from 0 < F u P max , then it obtains | u | P max / 2 , which transforms a non-negative constraint on the actual control into a symmetric constraint on the composite control. Among Assumption 1, V max is regarded as an upper bound on x 2 d . Due to 0 x 2 V max and 0 x 2 d V max , and from the definition of error, it follows V max e 2 = x 2 x 2 d V max . In this way, the non-negative constraints of the state of the original system x 2 are transformed into the symmetric constraints of the error state e 2 . In the case of x 2 being required to be non-negative, x 1 is monotonically increasing since x ˙ 1 = x 2 . This shows that the state x 1 is non-negative if its initial value x 1 ( 0 ) 0 . Next, we will take an adaptive control approach to estimate the unknown parameters online. Denote d ^ , σ ^ 0 , σ ^ 1 , J ^ 2 as the estimates of the unknown parameters d : = F + P max / 2 , σ 0 , σ 1 and J 2 , respectively, and denote d ˜ : = d d ^ , σ ˜ 0 : = σ 0 σ ^ 0 , σ ˜ 1 : = σ 1 σ ^ 1 , J ˜ 2 : = J 2 J ^ 2 as the corresponding estimation errors.
Thus, one can obtain
e ˙ 1 = e 2 , e ˙ 2 = 1 M ( u + d J 1 ( x 2 ) z J 2 x 2 ) x ¨ 1 d , u ˙ = c u + v ,
where c is a positive constant, v is the new control to be designed (refer to (33)) so that the tracking errors e 1 and e 2 can enter a small neighborhood near the origin in a finite time. Here, the purpose of introducing the third equation in (4) is to eliminate the constraint on u.

2.2. Preliminaries

To derive the finite-time stability of system (4), some preliminaries are needed and listed below.
Lemma 1
([35]). For any vectors x , y R n and positive scalar ε > 0 , it holds
x y ε p p | x | p + 1 q ε q | y | q ,
where positive constants p > 1 and q > 1 satisfy ( p 1 ) ( q 1 ) = 1 .
Lemma 2
([36]). For any positive real scalars m and n, vectors ϕ and ψ, and real function ω ( ϕ , ψ ) > 0 , it holds
| ϕ | m | ψ | n m m + n ω ( ϕ , ψ ) | ϕ | m + n + n m + n ω ( ϕ , ψ ) m n | ψ | m + n .
Lemma 3
([37]). For any x i R ( i = 1 , 2 , , n ) and positive scalar γ ( 0 , 1 ) , it holds
( | x 1 | + + | x n | ) γ | x 1 | γ + + | x n | γ .
Lemma 4
([38]). For any scalar k > 0 , if x ( k , k ) , then
log k 2 k 2 x 2 x 2 k 2 x 2 .
Lemma 5
([26]). For nonlinear system x ˙ = f ( x ) , if there exists a positive definite function V ( x ) satisfying V ˙ ( x ) a V ( x ) b V γ ( x ) + c with constants a > 0 , b > 0 , 0 < γ < 1 and 0 < c < , then the trajectory of system x ˙ = f ( x ) is practical finite-time stable. Moreover, there exists a scalar 0 < λ < 1 such that
V ( x ) min { c a ( 1 λ ) , ( c b ( 1 λ ) ) 1 γ } ,
where t T r , the setting time is given by
T r max { t 0 + 1 a λ ( 1 γ ) ln a λ V 1 γ ( t 0 ) + b b , t 0 + 1 a ( 1 γ ) ln a V 1 γ ( t 0 ) + b λ b λ } ,
where t 0 denotes the initial time.
Remark 2.
Lemmas 1–4 are used to derive the design process of control strategy, and Lemma 5 is invoked in the proof of Theorem 1 to analyze the stability of shield tunneling system. From Lemma 5, one can provide a rigorous framework for designing controllers that guarantee fast and robust convergence and specifically give a small domain of convergence and a maximum value of convergence time. In this study, we will achieve the finite-time stability of the shield tunneling system using these Lemmas.
Lemma 6
([39]). For any nonlinear function f ( Z ) : R n R , Z is an input vector on a compact set Ω Z R n , which can be approximated by an RBF neural network as
f ( Z ) = W T S ( Z ) + δ ( Z ) , Z Ω Z R n
where δ ( Z ) is the approximation error satisfies | δ ( Z ) | ε , scalar ε > 0 , vector S ( Z ) = [ s 1 ( Z ) , s 2 ( Z ) , , s ( Z ) ] T R represents the basis function vector, positive integer > 1 denotes the number of neural network nodes and the Gaussian function s i ( Z ) ( i { 1 , 2 , , } ) is given as
s i ( Z ) = exp ( Z μ i ) T ( Z μ i ) ν i 2 ,
where μ i and ν i are the center and the width of s i ( Z ) , respectively. The ideal weight vector W is
W = arg min W R sup Z Ω Z | f ( Z ) W T S ( Z ) |
where W = [ W 1 , W 2 , , W ] T R is the weight vector of neural network.
Remark 3.
It is known that the RBF neural network poses powerful nonlinear approximation ability. With the RBF neural network, we can efficiently handle complex nonlinear problems by mapping the input vector directly to the hidden space and utilizing radial basis functions (e.g., Gaussian functions) as activation functions. This nonlinear mapping enables RBF neural networks to approximate any complex nonlinear function. RBF neural networks, as a special case of BP neural networks, have a simpler structure, a fast learning convergence rate, and a better generalization ability. At present, RBF neural networks have been applied to various fields, such as function approximation, pattern recognition and classification, fault diagnosis, and image processing. In this paper, RBF neural networks are selected to approximate the unknown nonlinear functions in the process of control strategy design.

3. Controller Design

Before designing the controller, we list the needed parameters in Table 2.
First, we make a coordinate transformation as
η 1 = e 1 , η 2 = e 2 α 1 , η 3 = u α 2 ,
where α 1 and α 2 are the virtual controls to be designed (refer to (19) and (26)).
We regard system (4) as three subsystems. For each subsystem, we design a virtual control law to ensure its stability. Then, we can obtain the control law v for the entire system (4). Therefore, we need to adopt the following three steps.
Step 1: Let f 1 ( Z 1 ) = η 1 2 + c 1 η 1 2 λ 1 with Z 1 = [ x 1 , x 1 d ] T , scalars λ ( 0 , 1 ) and c 1 R > 0 . From Lemma 6, f 1 ( Z 1 ) can be approximated by an RBF neural network. Thus, we have
f 1 ( Z 1 ) = W 1 T S 1 ( Z 1 ) + δ 1 ( Z 1 ) , | δ 1 ( Z 1 ) | ε 1 .
where W 1 is the ideal weight coefficient, S 1 ( Z 1 ) is the basis function vector, δ 1 ( Z 1 ) is the approximation error and ε 1 is a positive number. Define θ 1 = W 1 2 , θ ^ 1 as the estimate of θ 1 , and θ ˜ 1 = θ 1 θ ^ 1 as the estimation error.
The Lyapunov function is chosen as
V 1 = 1 2 η 1 2 + 1 2 r 1 θ ˜ 1 2 ,
where r 1 is a positive constant. Thus, it obtains
V ˙ 1 = η 1 ( η 2 + α 1 ) 1 r 1 θ ˜ 1 θ ^ ˙ 1 c 1 η 1 2 λ + η 1 ( c 1 η 1 2 λ 1 + η 1 2 + α 1 ) + η 2 2 2 1 r 1 θ ˜ 1 θ ^ ˙ 1 .
According to Lemma 2 and the definition of θ 1 , it follows
η 1 f 1 ( Z 1 ) = η 1 ( W 1 T S 1 ( Z 1 ) + δ 1 ( Z 1 ) ) η 1 2 W 1 2 S 1 T S 1 2 a 2 + a 2 2 + η 1 2 2 b 2 + b 2 δ 1 2 2 η 1 2 θ 1 S 1 T S 1 2 a 2 + a 2 2 + η 1 2 2 b 2 + b 2 ε 1 2 2 ,
where a and b are positive constants. The virtual control α 1 is designed as
α 1 = c 1 η 1 η 1 θ ^ 1 S 1 T S 1 2 a 2 η 1 2 b 2
and θ ^ 1 is updated according to
θ ^ ˙ 1 = r 1 η 1 2 S 1 T S 1 2 a 2 2 θ ^ 1 .
Substituting the virtual control (19) and the update rule (20) of θ ^ 1 into (17), we obtain
V ˙ 1 c 1 η 1 2 λ c 1 η 1 2 + η 2 2 2 + 2 r 1 θ ˜ 1 θ ^ 1 + a 2 2 + b 2 ε 1 2 2 .
Step 2: Let f 2 ( Z 2 ) = η 2 ( k b 2 2 η 2 2 ) 2 + c 2 η 2 2 λ 1 ( k b 2 2 η 2 2 ) λ 1 + η 2 2 ( k b 2 2 η 2 2 ) M x ¨ 1 d M α 1 ˙ with Z 2 = [ x 1 , x 1 d , θ ^ 1 , x 2 , x 2 d ] T and positive constants c 2 and k b 2 . Similarly, from Lemma 6, it is known that
f 2 ( Z 2 ) = W 2 T S 2 ( Z 2 ) + δ 2 ( Z 2 ) , | δ 2 ( Z 2 ) | ε 2
where W 2 is the ideal weight coefficient, S 2 ( Z 2 ) is the basis function vector, δ 2 ( Z 2 ) is the approximation error and ε 2 is a positive number. Define θ 2 = W 2 2 , θ ^ 2 as the estimate of θ 2 , and θ ˜ 2 = θ 2 θ ^ 2 as the estimation error. The Lyapunov function is chosen as
V 2 = V 1 + M ( t ) 2 log ( k b 2 2 k b 2 2 η 2 2 ) + 1 2 r 2 θ ˜ 2 2 + 1 2 r 3 d ˜ 2 + 1 2 r 4 σ ˜ 0 2 + σ 0 2 r 5 σ ˜ 1 2 + 1 2 r 6 J ˜ 2 2 ,
where r i ( i = 2 , , 6 ) are positive constants. By taking the derivative of the second term, we obtain
M ( t ) 2 log k b 2 2 k b 2 2 η 2 2 = M ( t ) 2 log k b 2 2 k b 2 2 η 2 2 + M ( t ) 2 · k b 2 2 η 2 2 k b 2 2 · 2 k b 2 2 η 2 η ˙ 2 ( k b 2 2 η 2 2 ) 2 = M ( t ) 2 log k b 2 2 k b 2 2 η 2 2 + η 2 k b 2 2 η 2 2 ( u + d J 1 ( x 2 ) z J 2 x 2 M x ¨ 1 d M α ˙ 1 ) .
In accordance with the coordinate change (14), u = η 3 + α 2 . Consequently,
V ˙ 2 = V ˙ 1 + η 2 k b 2 2 η 2 2 η 3 + α 2 + d σ 0 z + σ 0 σ 1 | x 2 | g ( x 2 ) z J 2 x 2 M x ¨ 1 d M α 1 ˙ + M ( t ) 2 log k b 2 2 k b 2 2 η 2 2 1 r 2 θ ˜ 2 θ ^ ˙ 2 1 r 3 d ˜ d ^ ˙ 1 r 4 σ ˜ 0 σ ^ ˙ 0 σ 0 r 5 σ ˜ 1 σ ^ ˙ 1 1 r 6 J ˜ 2 J ^ ˙ 2 .
From Lemma 4 and Assumption 2, we have
M ( t ) 2 log ( k b 2 2 k b 2 2 η 2 2 ) M d 2 η 2 2 k b 2 2 η 2 2 .
Notice that η 2 k b 2 2 η 2 2 η 3 η 3 2 2 + η 2 2 2 ( k b 2 2 η 2 2 ) , η 2 2 2 = η 2 k b 2 2 η 2 2 · η 2 ( k b 2 2 η 2 2 ) 2 , it obtains
V ˙ 2 c 1 η 1 2 λ c 1 η 1 2 + 2 r 1 θ ˜ 1 θ ^ 1 + a 2 2 + b 2 ε 1 2 2 + η 3 2 2 + η 2 k b 2 2 η 2 2 ( M d η 2 2 + f 2 ( Z 2 ) + α 2 + d σ 0 z + σ 0 σ 1 | x 2 | g ( x 2 ) z J 2 x 2 ) c 2 η 2 2 λ ( k b 2 2 η 2 2 ) λ 1 r 2 θ ˜ 2 θ ^ ˙ 2 1 r 3 d ˜ d ^ ˙ 1 r 4 σ ˜ 0 σ ^ ˙ 0 σ 0 r 5 σ ˜ 1 σ ^ ˙ 1 1 r 6 J ˜ 2 J ^ ˙ 2 .
According to Lemma 1 and the definition of θ 2 , it has
η 2 k b 2 2 η 2 2 f 2 ( Z 2 ) = η 2 k b 2 2 η 2 2 ( W 2 T S 2 ( Z 2 ) + δ 2 ( Z 2 ) ) η 2 2 θ 2 S 2 T S 2 2 a 2 ( k b 2 2 η 2 2 ) 2 + a 2 2 + η 2 2 2 b 2 ( k b 2 2 η 2 2 ) 2 + b 2 ε 2 2 2 .
The virtual control α 2 is designed as
α 2 = c 2 η 2 η 2 θ ^ 2 S 2 T S 2 2 a 2 ( k b 2 2 η 2 2 ) η 2 2 b 2 ( k b 2 2 η 2 2 ) M d η 2 2 d ^ + σ ^ 0 z σ ^ 0 σ ^ 1 | x 2 | g ( x 2 ) z + J ^ 2 x 2 .
Moreover, the update rules for θ ^ 2 , d ^ , σ ^ 0 , σ ^ 1 and J ^ 2 are defined as
θ ^ ˙ 2 = r 2 η 2 2 S 2 T S 2 2 a 2 ( k b 2 2 η 2 2 ) 2 2 θ ^ 2 , d ^ ˙ = r 3 η 2 k b 2 2 η 2 2 2 d ^ , σ ^ ˙ 0 = r 4 η 2 z σ ^ 1 | x 2 | g ( x 2 ) z k b 2 2 η 2 2 2 σ ^ 0 , σ ^ ˙ 1 = r 5 η 2 | x 2 | g ( x 2 ) z k b 2 2 η 2 2 2 σ ^ 1 , J ^ ˙ 2 = r 6 η 2 x 2 k b 2 2 η 2 2 2 J ^ 2 .
Substituting the virtual control (26) and the update rule (27) into (24), we obtain
V ˙ 2 c 1 η 1 2 λ c 1 η 1 2 + 2 r 1 θ ˜ 1 θ ^ 1 + a 2 + b 2 ( ε 1 2 + ε 2 2 ) 2 + η 3 2 2 c 2 η 2 2 k b 2 2 η 2 2 c 2 η 2 2 λ ( k b 2 2 η 2 2 ) λ + 2 r 2 θ ˜ 2 θ ^ 2 + 2 r 3 d ˜ d ^ + 2 r 4 σ ˜ 0 σ ^ 0 + 2 σ 0 r 5 σ ˜ 1 σ ^ 1 + 2 r 6 J ˜ 2 J ^ 2
due to the fact that σ 0 σ 1 σ ^ 0 σ ^ 1 = σ 0 σ ˜ 1 + σ ˜ 0 σ ^ 1 .
Step 3: Let f 3 ( Z 3 ) = η 3 ( k b 3 2 η 3 2 ) 2 + c 3 η 3 2 λ 1 ( k b 3 2 η 3 2 ) λ 1 α ˙ 2 with Z 3 = [ x 1 , x 2 , u , x 1 d , x 2 d , θ ^ 1 , θ ^ 2 , d ^ , σ ^ 0 , σ ^ 1 , J ^ 2 ] T , and positive constants c 3 and k b 3 . Furthermore, from Lemma 6, it follows
f 3 ( Z 3 ) = W 3 T S 3 ( Z 3 ) + δ 3 ( Z 3 ) , | δ 3 ( Z 3 ) | ε 3
where W 3 is the ideal weight coefficient, S 3 ( Z 3 ) is the basis function vector, δ 3 ( Z 3 ) is the approximation error and ε 3 is a positive number. Define θ 3 = W 3 2 , θ ^ 3 as the estimate of θ 3 , and θ ˜ 3 = θ 3 θ ^ 3 as the estimation error. The Lyapunov function is chosen as
V = V 2 + 1 2 log k b 3 2 k b 3 2 η 3 2 + 1 2 r 7 θ ˜ 3 2 ,
where r 7 is a positive constant. Notice that η 3 2 2 = η 3 k b 3 2 η 3 2 · η 3 ( k b 3 2 η 3 2 ) 2 , it follows
V ˙ = V 2 ˙ + η 3 ( k b 3 2 η 3 2 ) ( c u + v α ˙ 2 ) 1 r 7 θ ˜ 3 θ ^ ˙ 3 c 1 η 1 2 c 1 η 1 2 λ c 2 η 2 2 k b 2 2 η 2 2 c 2 η 2 2 λ ( k b 2 2 η 2 2 ) λ + a 2 + b 2 ( ε 1 2 + ε 2 2 ) 2 c 3 η 3 2 λ ( k b 3 2 η 3 2 ) λ + η 3 ( k b 3 2 η 3 2 ) f 3 ( Z 3 ) c u + v + 2 r 1 θ ˜ 1 θ ^ 1 + 2 r 2 θ ˜ 2 θ ^ 2 + 2 r 3 d ˜ d ^ + 2 r 4 σ ˜ 0 σ ^ 0 + 2 σ 0 r 5 σ ˜ 1 σ ^ 1 + 2 r 6 J ˜ 2 J ^ 2 1 r 7 θ ˜ 3 θ ^ ˙ 3 .
According to Lemma 1 and the definition of θ 3 , it obtains
η 3 k b 3 2 η 3 2 f 3 ( Z 3 ) = η 3 k b 3 2 η 3 2 ( W 3 T S 3 ( Z 3 ) + δ 3 ( Z 3 ) ) η 3 2 θ 3 S 3 T S 3 2 a 2 ( k b 3 2 η 3 2 ) 2 + a 2 2 + η 3 2 2 b 2 ( k b 3 2 η 3 2 ) 2 + b 2 ε 3 2 2 .
Therefore, the new control v is designed as
v = c 3 η 3 + c u η 3 θ ^ 3 S 3 T S 3 2 a 2 ( k b 3 2 η 3 2 ) η 3 2 b 2 ( k b 3 2 η 3 2 ) ,
where the updating rule for θ ^ 3 is defined as
θ ^ ˙ 3 = r 7 η 3 2 S 3 T S 3 2 a 2 ( k b 3 2 η 3 2 ) 2 2 θ ^ 3 .
Substituting the new control (33) and the update rule (34) of θ ^ 3 into (31), we obtain
V ˙ c 1 η 1 2 c 2 η 2 2 k b 2 2 η 2 2 c 3 η 3 2 k b 3 2 η 3 2 c 1 η 1 2 λ c 2 η 2 2 λ ( k b 2 2 η 2 2 ) λ c 3 η 3 2 λ ( k b 3 2 η 3 2 ) λ + 2 r 1 θ ˜ 1 θ ^ 1 + 2 r 2 θ ˜ 2 θ ^ 2 + 2 r 3 d ˜ d ^ + 2 r 4 σ ˜ 0 σ ^ 0 + 2 σ 0 r 5 σ ˜ 1 σ ^ 1 + 2 r 6 J ˜ 2 J ^ 2 + 2 r 7 θ ˜ 3 θ ^ 3 + 3 2 a 2 + b 2 ( ε 1 2 + ε 2 2 + ε 3 2 ) 2 .
Based on Lemma 1, the item 2 r 1 θ ˜ 1 θ ^ 1 reduces to
2 r 1 θ ˜ 1 θ ^ 1 = 2 r 1 θ ˜ 1 θ 1 2 r 1 θ ˜ 1 2 1 r 1 θ ˜ 1 2 + 1 r 1 θ 1 2 = 1 r 1 θ ˜ 1 2 + 1 r 1 θ 1 2 + θ ˜ 1 2 2 r 1 λ θ ˜ 1 2 2 r 1 λ .
Let ϕ = 1 , ψ = θ ˜ 1 2 2 r 1 , n = λ , m = 1 λ , ω = λ λ 1 λ , from Lemma 2, we have
θ ˜ 1 2 2 r 1 λ ( 1 λ ) λ λ 1 λ + θ ˜ 1 2 2 r 1 .
Thus, it holds
2 r 1 θ ˜ 1 θ ^ 1 1 2 r 1 θ ˜ 1 2 + 1 r 1 θ 1 2 + ( 1 λ ) λ λ 1 λ θ ˜ 1 2 2 r 1 λ .
Similarly, one can obtain
2 r 2 θ ˜ 2 θ ^ 2 1 2 r 2 θ ˜ 2 2 + 1 r 2 θ 2 2 + ( 1 λ ) λ λ 1 λ θ ˜ 2 2 2 r 2 λ , 2 r 3 d ˜ d ^ 1 2 r 3 d ˜ 2 + 1 r 3 d 2 + ( 1 λ ) λ λ 1 λ d ˜ 2 2 r 3 λ , 2 r 4 σ ˜ 0 σ ^ 0 1 2 r 4 σ ˜ 0 2 + 1 r 4 σ 0 2 + ( 1 λ ) λ λ 1 λ σ ˜ 0 2 2 r 4 λ , 2 σ 0 r 5 σ ˜ 1 σ ^ 1 σ 0 2 r 5 σ ˜ 1 2 + σ 0 r 5 σ 1 2 + ( 1 λ ) λ λ 1 λ σ 0 σ ˜ 1 2 2 r 5 λ , 2 r 6 J ˜ 2 J ^ 2 1 2 r 6 J ˜ 2 2 + 1 r 6 J 2 2 + ( 1 λ ) λ λ 1 λ J ˜ 2 2 2 r 6 λ , 2 r 7 θ ˜ 3 θ ^ 3 1 2 r 7 θ ˜ 3 2 + 1 r 7 θ 3 2 + ( 1 λ ) λ λ 1 λ θ ˜ 3 2 2 r 7 λ .
Substituting (38) and (39) into (35), it has
V ˙ c 1 η 1 2 c 2 η 2 2 k b 2 2 η 2 2 c 3 η 3 2 k b 3 2 η 3 2 c 1 η 1 2 λ c 2 η 2 2 λ ( k b 2 2 η 2 2 ) λ c 3 η 3 2 λ ( k b 3 2 η 3 2 ) λ 1 2 r 1 θ ˜ 1 2 1 2 r 2 θ ˜ 2 2 d ˜ 2 2 r 3 σ ˜ 0 2 2 r 4 σ 0 σ ˜ 1 2 2 r 5 J ˜ 2 2 2 r 6 1 2 r 7 θ ˜ 3 2 θ ˜ 1 2 2 r 1 λ θ ˜ 2 2 2 r 2 λ d ˜ 2 2 r 3 λ σ ˜ 0 2 2 r 4 λ σ 0 σ ˜ 1 2 2 r 5 λ J ˜ 2 2 2 r 6 λ θ ˜ 3 2 2 r 7 λ + θ 1 2 r 1 + θ 2 2 r 2 + d 2 r 3 + σ 0 2 r 4 + σ 0 σ 1 2 r 5 + J 2 2 r 6 + θ 3 2 r 7 + 7 ( 1 λ ) λ λ 1 λ + 3 2 a 2 + b 2 ( ε 1 2 + ε 2 2 + ε 3 2 ) 2 .
By following the aforementioned backstepping procedure, and substituting v in (33) into the third equation of system (4), we can obtain actual control F u . The sketched procedure is summarized in Table 3.
Now, we discuss the finite-time stability of the error system (4) as follows
Theorem 1.
For the error system (4) that satisfies Assumptions 1 and 2, the trajectory of the system (4) is practical finite-time stability if the virtual controls α 1 and α 2 , the new control v, and the parameters update rules satisfy (19), (20), (26), (27), (33) and (34). Then, the tracking errors e 1 and e 2 can converge to a small neighborhood near the origin in a finite time, i.e., the displacement and velocity of the shield tunneling machine can track the desired signal in a finite time.
Proof. 
Let c 0 = min { c 1 , c 2 , c 3 } , from Lemmas 3 and 4, we have
c 1 η 1 2 c 2 η 2 2 k b 2 2 η 2 2 c 3 η 3 2 k b 3 2 η 3 2 c 1 η 1 2 λ c 2 η 2 2 λ ( k b 2 2 η 2 2 ) λ c 3 η 3 2 λ ( k b 3 2 η 3 2 ) λ c 0 η 1 2 + η 2 2 k b 2 2 η 2 2 + η 3 2 k b 3 2 η 3 2 + η 1 2 λ + η 2 2 λ ( k b 2 2 η 2 2 ) λ + η 3 2 λ ( k b 3 2 η 3 2 ) λ c min ( η 1 2 + log k b 2 2 k b 2 2 η 2 2 + log k b 3 2 k b 3 2 η 3 2 + η 1 2 λ + log k b 2 2 k b 2 2 η 2 2 λ + log k b 3 2 k b 3 2 η 3 2 λ ) ,
where c min = min { 2 c 0 M min , 2 c 0 , ( 2 M min ) λ c 0 , 2 λ c 0 } . Thus, it holds
V ˙ φ 1 V φ 1 V λ + β ,
where
φ 1 : = min { c min , 1 } , β : = θ 1 2 r 1 + θ 2 2 r 2 + d 2 r 3 + σ 0 2 r 4 + σ 0 σ 1 2 r 5 + J 2 2 r 6 + θ 3 2 r 7 + 7 ( 1 λ ) λ λ 1 λ + 3 2 a 2 + b 2 ( ε 1 2 + ε 2 2 + ε 3 2 ) 2 .
From the Lemma 5, it is known that the trajectory of the system (4) is practical finite-time stability, the displacement and propulsive velocity of the shield tunneling system track to the desired signals in a finite time.
T max { t 0 + 1 φ 1 γ ( 1 λ ) ln φ 1 γ V 1 λ ( t 0 ) + φ 1 φ 1 , t 0 + 1 φ 1 ( 1 λ ) ln φ 1 V 1 λ ( t 0 ) + φ 1 γ φ 1 γ } ,
where 0 < γ 1 and t 0 denotes the initial instant. □
Remark 4.
Theorem 1 provides a finite-time tracking control method for shield tunneling systems with constraints on states and input. For handling the constraint on control input u, the third equation in (4) is introduced, and the new control v is designed as (33), which can ensure that the control input u satisfies the constraint condition. If the constraint on control input u is not considered, the u = α 2 and η 3 = 0 hold, which may lead to intense oscillations of u. In contrast, due to the inhibitory effect of integration on oscillations, it can be observed from the third equation in (4) and (33) that the control input u with constrain designed in this paper is smoother. In contrast to the ones in [14,15], the method proposed in this paper can achieve finite-time stability of shield tunneling systems with some constraints.

4. Simulation Study

To validate the accuracy of the aforementioned findings, we analyzed the excavation construction data from ring 355 of Beijing Metro Line 2 within the first 1000 s. The actual displacements of four groups of cylinders were depicted in Figure 3. Correspondingly, the actual propulsive force of the shield tunneling machine is shown in Figure 4.
From Figure 3, one can find that the propulsive velocity is approximately 1 mm/s. Therefore, the desired signals are selected as x 1 d = 0.001 t and x 2 d = 0.001 m/s. The ring is in the pebble layer of C 1 level. The unloaded mass of the shield head is about 340 tons, and the friction coefficient between the shell of the shield tunneling machine and the soil is measured as 0.21 , so the Coulomb friction is about F c = 6.99 × 10 5 N. In the shutdown state, the thrust of the shield tunneling machine is kept at 7.77 × 10 6 N to maintain balance, i.e., the static friction force is F s = 7.77 × 10 6 N. The diameter of the cutter head is 6.18 m. The depth of the tunnel is 12.8 m, the diameter and the length of the body of the shield tunneling machine are 6.14 m and 8.28 m, respectively. The specific gravity of the soil is about 1.28 × 10 5 Kg/m3, and the coefficient of the lateral pressure caused by soil and water is about 0.47 . Form the empirical formula, the friction force is calculated as f 4.8 × 10 6 N. For the ideal case of the propulsive velocity x 2 being constant, the value of J 1 ( x 2 ) z + J 2 x 2 with z ˙ = x 2 σ 0 | x 2 | g ( x 2 ) z is mainly determined by the values of F c and σ 2 , so we can deduce σ 2 4.1 × 10 9 Ns/m. For clarity, the values of some parameters are listed in Table 4.
Let the upper bound of the control input P max = 1.28 × 10 4 kN, initial values x 1 ( 0 ) = 0 , x 2 ( 0 ) = 0 and F u ( 0 ) = 7.77 × 10 4 kN, parameters k b 2 = 0.0012 , k b 3 = 10 , 000 and a = 0.1 , b = 0.3 , c = 50 , c 1 = c 2 = 100 , c 3 = 500 , r i = 0.05 ( i = 1 , 2 , , 7 ) . Moreover, the RBF neural network is chosen as Gaussian function centers uniformly distributed between [ 1.5 , 1.5 ] with a width of 2 (i.e., μ i = 2 + 0.5 i and ν i = 2 ( i = 1 , 2 , , 7 ) ).
For the error system (4), the update rules of the virtual controls α 1 and α 2 , the signals v and θ ^ 1 , θ ^ 2 , θ ^ 3 , d ^ , σ ^ 0 , σ ^ 1 and J ^ 2 are designed according to Theorem 1. Based on the above design, we run a simulation for 300 s using MATLAB R2023b (MathWorks, Inc., Natick, MA, USA). The simulation results are shown in Figure 5, Figure 6 and Figure 7, which show the response curves of the system states, desired signals, and control input, respectively. From Figure 5, one can see that the curves of the system state x 1 and the desired displacement are almost identical. Similarly, the system state x 2 can track the desired velocity in Figure 6. Correspondingly, the propulsive force of cylinders is depicted in Figure 7. Obviously, after starting for 10 s, the value of the propulsive force F u is almost kept as 1.26 × 10 7 N and meets the constraint on the input.
When the constrain on the control input is not considered, then u = α 2 and F u = u + P max / 2 . At this time, the control input F u without constrain is shown in Figure 8. Obviously, the control input F u without constraint oscillates sharply, and its maximum is approximately 1.5 × 10 7 N and larger than the desired upper bound 1.28 × 10 7 N. Compared with Figure 4 and Figure 8, F u with constraint in Figure 7 is smoother and then easier to implement in shield machine operation, which shows that the adaptive finite-time backstepping control strategy proposed in this paper is effective.

5. Conclusions

In this paper, the finite-time tracking control problem of shield tunneling systems is studied based on the LuGre friction model. The constraint on the state is handled by combining the use of transformation and a logarithmic barrier Lyapunov function, while the constraint on the control input is handled by designing an auxiliary differential equation. Meanwhile, the unknown functions are approximated by radial basis function neural networks. Furthermore, using an adaptive finite-time backstepping method, a finite-time tracking control strategy is proposed, and the finite-time stability of the closed-loop system is achieved. Finally, the theoretical results are verified via the actual data of practical engineering, which shows the effectiveness of the proposed finite-time control method for shield tunneling systems with constrains. In the future, we will try to utilize the technique of sliding mode control (SMC) by combining sampled data with physical models, and then apply the obtained results to practical engineering.

Author Contributions

Methodology, L.Y.; validation, F.L.; resources, K.H.; data curation, F.L.; writing—original draft, L.Y.; writing—review and editing, X.Z.; project administration, X.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Natural Science Foundation of Henan Province (grant numbers: 242300421399 and 242300421211), Postgraduate Education Reform and Quality Improvement Project of Henan Province (grant number: YJS2023AL009), Teaching Reform Project of Zhengzhou University (grant number: 2022ZZUJG035), and Open Project of State Key Laboratory of Shield Machine and Boring Technology (Contract no. SKST-2018-K02).

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Huang, W.; Wu, B. Risk assessment of shield tunnel construction in coastal areas. Pol. J. Environ. Stud. 2024, 33, 2693–2706. [Google Scholar] [CrossRef] [PubMed]
  2. Zhang, J.Y.; Zhang, Y.J.; Shen, M.R.; Zhang, D. Recognition and prediction of safety pattern for tunnel face of shield tunneling. IEEE Trans. Intell. Transp. Syst. 2024, 25, 5071–5084. [Google Scholar] [CrossRef]
  3. Hu, D.; Hu, Y.J.; Yi, S.; Liang, X.; Li, Y.; Yang, X. Surface settlement prediction of rectangular pipe-jacking tunnel based on the machine-learning algorithm. J. Pipeline Syst. Eng. Pract. 2024, 15, 04023061. [Google Scholar] [CrossRef]
  4. Sun, M.M.; Fang, H.Y.; Wang, N.N.; Du, X.M.; Zhao, H.S.; Zhai, K.J. Limit state equation and failure pressure prediction model of pipeline with complex loading. Nat. Commun. 2024, 15, 4473. [Google Scholar] [CrossRef] [PubMed]
  5. Liu, H.; Yue, Y.P.; Lian, Y.L.; Meng, X.; Du, Y.; Cui, J. Reverse-time migration of GPR data for imaging cavities behind a reinforced shield tunnel. Tunn. Undergr. Space Technol. 2024, 146, 105649. [Google Scholar] [CrossRef]
  6. Liu, H.; Chen, J.H.; Zhang, X.Y.; Dai, D.; Cui, J.; Spencer, B.F. Collaborative imaging of subsurface cavities using ground pipeline penetrating radar. IEEE Geosci. Remote Sens. Lett. 2024, 21, 3002205. [Google Scholar] [CrossRef]
  7. Dahl, P.R. Solid friction damping of mechanical vibrations. AIAA J. 1976, 14, 1675–1682. [Google Scholar] [CrossRef]
  8. Pan, J.; Dai, P.; Ma, Q.; Liu, M.; Yang, Z.; Lei, S. Application research of gun servo system based on Stribeck friction model. J. Physics Conf. Ser. 2023, 2478, 092012. [Google Scholar] [CrossRef]
  9. Wang, Y.; Guo, C.; Jia, S.; Ning, K.; Lan, H. Stability analysis of disc friction pairs based on Stribeck model. China Mech. Eng. 2017, 28, 2521–2525. [Google Scholar]
  10. de Wit, C.C.; Olsson, H.; Astrom, K.J.; Lischinsky, P. A new model for control of systems with friction. IEEE Trans. Autom. Control. 1995, 40, 419–425. [Google Scholar] [CrossRef]
  11. Lyu, N.F.; Xia, Y.X.; Zhang, B.; Bao, Q.L.; Xia, H.Y.; Ma, R.Q.; Jiang, J. Research on Friction Compensation of Non-Uniform Force in Photoelectric Tracking System. Laser Technology. Available online: https://link.cnki.net/KCMS/detail/detail.aspx?dbcode=CAPJ&dbname=CAPJLAST&filename=JGJS20231127001&uniplatform=OVERSEA&v=AKO9Kdl7P8HIEqC9Gq1-BCdOkzOkdTLGPOzbS2hq7stiTX5x7f97DCA8MG5Gyyot (accessed on 20 June 2024).
  12. Chen, P.N.; Liu, X.B.; Yan, Q.Z. Adaptive friction compensation for a class of mechanical systems based on LuGre model. Int. J. Robust Nonlinear Control. 2022, 32, 4510–4534. [Google Scholar] [CrossRef]
  13. Zhang, W.J.; Li, M.Y.; Gao, Y.P.; Chen, Y. Periodic adaptive learning control of PMSM servo system with LuGre model-based friction compensation. Mech. Mach. Theory 2022, 167, 104561. [Google Scholar] [CrossRef]
  14. Xie, H.B.; Liu, Z.B.; Yang, H.Y. Advancing control for shield tunneling machine by backstepping design with LuGre friction model. Math. Probl. Eng. 2014, 2014, 1–10. [Google Scholar] [CrossRef]
  15. Liu, Z.B. Research on Dynamic Characteristics and Trajectory Tracking Control of Electro-Hydraulic Thrust System on Shield Tunneling Machine. Ph.D. Thesis, Zhejiang University, Hangzhou, China, 2015. [Google Scholar]
  16. Mousavi, A.; Markazi, A.H.; Ferrara, A. A barrier function-based second-order sliding mode control with optimal reaching for full-state and input-constrained nonlinear systems. IEEE Trans. Autom. Control. 2024, 69, 395–402. [Google Scholar] [CrossRef]
  17. Jiang, Y.B.; Liu, Z.X.; Chen, F. Adaptive output-constrained finite-time formation control for multiple unmanned surface vessels with directed communication topology. Ocean. Eng. 2024, 192, 116552. [Google Scholar] [CrossRef]
  18. Tee, K.P.; Ge, S.S.; Tay, E.H. Barrier Lyapunov functions for the control of output-constrained nonlinear systems. Automatica 2009, 45, 918–927. [Google Scholar] [CrossRef]
  19. Yin, Z.; He, W.; Yang, C.G. Tracking control of a marine surface vessel with full-state constraints. Int. J. Syst. Sci. 2017, 48, 535–546. [Google Scholar] [CrossRef]
  20. Li, D.Y.; Ma, G.F.; Li, C.J.; He, W.; Mei, J.; Ge, S.S. Distributed attitude coordinated control of multiple spacecraft with attitude constraints. IEEE Trans. Aerosp. Electron. Syst. 2018, 54, 2233–2245. [Google Scholar] [CrossRef]
  21. Zhao, Z.; He, W.; Ge, S.S. Adaptive neural network control of a fully actuated marine surface vessel with multiple output constraints. IEEE Trans. Control Syst. Technol. 2014, 22, 1536–1543. [Google Scholar] [CrossRef]
  22. He, W.; Yin, Z.; Sun, C.Y. Adaptive neural network control of a marine vessel with constraints using the asymmetric barrier Lyapunov function. IEEE Trans. Cybern. 2016, 47, 1641–1651. [Google Scholar] [CrossRef]
  23. Peng, Z.H.; Wang, J.; Wang, D.; Han, Q.L. An overview of recent advances in coordinated control of multiple autonomous surface vehicles. IEEE Trans. Ind. Inform. 2021, 17, 732–745. [Google Scholar] [CrossRef]
  24. Jia, C.X.; Chen, F.; Xiang, L.Y.; Lan, W.; Feng, G. When distributed formation control is feasible under hard constraints on energy and time? Automatica 2022, 135, 109984. [Google Scholar] [CrossRef]
  25. Yu, S.H.; Yu, X.H.; Shirinzadeh, B.; Man, Z. Continuous finite-time control for robotic manipulators with terminal sliding mode. Automatica 2005, 41, 1957–1964. [Google Scholar] [CrossRef]
  26. Soukkou, Y.; Tadjine, M.; Ibouche, M.N. Adaptive finite time command filtered backstepping control design for a class of uncertain full state constrained strict-feedback nonlinear systems. Int. J. Robust Nonlinear Control 2023, 33, 10647–10661. [Google Scholar] [CrossRef]
  27. Zhang, C.Y.; Sheng, A.D.; Qi, G.Q.; Li, Y. Finite-time stand off tracking control of moving target by means of backstepping for non-holonmic robot. Acta Autom. Sin. 2019, 45, 540–552. [Google Scholar]
  28. Doostmohammadian, M.; Meskin, N. Finite-time stability under denial of service. IEEE Syst. J. 2021, 15, 1048–1055. [Google Scholar] [CrossRef]
  29. Chen, B.; Hu, J.P.; Ghosh, B.K. Finite-time tracking control of heterogeneous multi-AUV systems with partial measurements and intermittent communication. Sci. China (Inf. Sci.) 2024, 67, 165–182. [Google Scholar] [CrossRef]
  30. Liu, Y.C.; Zhu, Q.D.; Wang, L.P. Practical finite-time control for marine surface vessel with output constraints. Control Theory Technol. 2023, 40, 353–359. [Google Scholar]
  31. Liu, S.; Song, J.; Zhang, L.Y.; Tan, Y. Adaptive finite-time backstepping integral sliding mode control of three-degree-of-freedom stabilized system for ship propulsion-assisted sail based on the inverse system method. J. Mar. Sci. Eng. 2024, 12, 348. [Google Scholar] [CrossRef]
  32. Song, F.Z.; Liu, Y.; Dong, Y.; Chen, X.; Tan, J. Motion control of wafer scanners in lithography systems: From setpoint generation to multi-stage coordination. IEEE Trans. Instrum. Meas. 2024. [Google Scholar] [CrossRef]
  33. Jiang, T.; Lin, D.F. Fast finite-time backstepping for helicopters under input constraints and perturbations. Int. J. Syst. Sci. 2020, 51, 2868–2882. [Google Scholar] [CrossRef]
  34. Aström, K.J.; Canudas-De-Wit, C. Revisiting the LuGre friction model. IEEE Control Syst. Mag. 2008, 28, 101–114. [Google Scholar]
  35. Li, X.H.; Liu, H.; Liu, X.P. Adaptive H tracking control for a class of stochastic nonlinear systems with completely unknown functions. Control Theory Appl. 2019, 36, 1431–1441. [Google Scholar]
  36. Qian, C.; Wei, L. Non-lipschitz continuous stabilizers for nonlinear systems with uncontrollable unstable linearization. Syst. Control Lett. 2001, 42, 185–200. [Google Scholar] [CrossRef]
  37. Huang, J.; Wen, C.; Wang, W.; Song, Y.D. Design of adaptive finite-time controllers for nonlinear uncertain systems based on given transient specifications. Automatica 2016, 69, 395–404. [Google Scholar] [CrossRef]
  38. Tee, K.P.; Ren, B.; Ge, S.S. Control of nonlinear systems with time-varying output constraints. Automatica 2011, 47, 2511–2516. [Google Scholar] [CrossRef]
  39. Ge, S.S.; Hang, C.C.; Lee, T.H.; Zhang, T. Stable Adaptive Neural Network Control; Kluwer Academic: Boston, MA, USA, 2001. [Google Scholar]
Figure 1. Schematic diagram of shield tunneling machine excavation section.
Figure 1. Schematic diagram of shield tunneling machine excavation section.
Mathematics 12 02230 g001
Figure 2. Thrust jacks (cylinders) of shield tunneling machines.
Figure 2. Thrust jacks (cylinders) of shield tunneling machines.
Mathematics 12 02230 g002
Figure 3. The curves of actual displacements of four groups of cylinders.
Figure 3. The curves of actual displacements of four groups of cylinders.
Mathematics 12 02230 g003
Figure 4. The curve of the actual propulsive force.
Figure 4. The curve of the actual propulsive force.
Mathematics 12 02230 g004
Figure 5. The displacement x 1 of the shield tunneling machine and the desired signal x 1 d .
Figure 5. The displacement x 1 of the shield tunneling machine and the desired signal x 1 d .
Mathematics 12 02230 g005
Figure 6. The propulsive velocity x 2 of the shield tunneling machine and the desired signal x 2 d .
Figure 6. The propulsive velocity x 2 of the shield tunneling machine and the desired signal x 2 d .
Mathematics 12 02230 g006
Figure 7. The curve of F u with constraint.
Figure 7. The curve of F u with constraint.
Mathematics 12 02230 g007
Figure 8. The curve of F u without constraint.
Figure 8. The curve of F u without constraint.
Mathematics 12 02230 g008
Table 1. Some symbols in LuGre model and system.
Table 1. Some symbols in LuGre model and system.
SymbolsPhysical Meanings
x 1 Displacement
x 2 Propulsive velocity
MMass of shield head
FEarth pressure force exerted on cutter head
zAverage deflection of the bristles
σ 0 Stiffness of the bristles
σ 1 Damping coefficient
σ 2 Viscous coefficient
F c Coulomb friction force
F s Stiction force
v s Stribeck velocity
F u Propulsive force
x 1 d Desired displacement
x 2 d Desired propulsive velocity
Table 2. The representation of the parameters.
Table 2. The representation of the parameters.
ParametersRepresentation
e 1 Tracking error of displacement
e 2 Tracking error of propulsive velocity
V max Maximum value of the propulsive velocity
P max Maximum value of the propulsive force
M min Minimum value of the mass function
M max Maximum value of the mass function
M d Maximum value of the derivative of the mass function
u F u P m a x / 2 , composite control
vNew control to be designed
^ Estimated value of •
˜ ^ , error between estimated value ^ and true value •
V i Lyapunov function
η i Coordinate transformation
α i Virtual control
c i Feedback gain
r i Adaptation gain
Table 3. The sketched procedure of design controller.
Table 3. The sketched procedure of design controller.
Stage 1(1) Establishing system model (1)
Preparatory work(2) Transforming constraints
(3) Introducing auxiliary system u ˙ = c u + v
Stage 2(4) Making a coordinate transformation (14)
Design controller(5) Designing the virtual control α 1 in (19) and the update rule of
θ ^ 0 in (20)
(6) Designing the virtual control α 2 in (26) and update rules of
θ ^ 2 , d ^ , σ ^ 0 , σ ^ 1 and J ^ 2 in (27)
(7) Designing the control v in (33) and the update rule of θ ^ 3 in (34)
(8) Obtaining the actual control F u = u + P max / 2
Table 4. The values of some parameters in simulation.
Table 4. The values of some parameters in simulation.
ParametersValueUnit
M 4 × 10 5 + 50 , 000 × ( 1 cos ( t ) ) Kg
F c 6.99 × 10 5 N
F s 7.7 × 10 6 N
σ 0 5 × 10 8 N/m
σ 1 200Ns/m
σ 2 4.1 × 10 9 Ns/m
v s 0.3mm/s
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Hong, K.; Yuan, L.; Zhu, X.; Li, F. Design of Adaptive Finite-Time Backstepping Control for Shield Tunneling Systems with Constraints. Mathematics 2024, 12, 2230. https://doi.org/10.3390/math12142230

AMA Style

Hong K, Yuan L, Zhu X, Li F. Design of Adaptive Finite-Time Backstepping Control for Shield Tunneling Systems with Constraints. Mathematics. 2024; 12(14):2230. https://doi.org/10.3390/math12142230

Chicago/Turabian Style

Hong, Kairong, Lulu Yuan, Xunlin Zhu, and Fengyuan Li. 2024. "Design of Adaptive Finite-Time Backstepping Control for Shield Tunneling Systems with Constraints" Mathematics 12, no. 14: 2230. https://doi.org/10.3390/math12142230

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop